utkusen / jeopardize
a low(zero) cost threat intelligence&response tool against phishing domains
☆155Updated 2 years ago
Alternatives and similar repositories for jeopardize:
Users that are interested in jeopardize are comparing it to the libraries listed below
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆89Updated 2 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆135Updated 5 years ago
- Automated Tactics Techniques & Procedures☆253Updated last year
- DomainCheck is designed to assist operators with monitoring changes related to their domain names. This includes negative changes in cate…☆232Updated 4 months ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆205Updated 6 years ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆114Updated 5 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- thethe☆116Updated 4 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆138Updated 5 years ago
- A phishing kit collector for scavengers☆199Updated 2 months ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆156Updated 10 months ago
- LinkedIn reconnaissance tool☆51Updated 3 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 7 years ago
- useful pentest note☆66Updated last week
- A repo for security analytics & threat hunting resources☆21Updated 6 years ago
- Simulating Adversary Operations☆93Updated 6 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- penetration testing scripts☆136Updated 5 years ago
- Collect information about email addresses from Pastebin☆35Updated 3 years ago
- Python script to hunt phishing kits☆137Updated last year
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- NebulousAD automated credential auditing tool.☆154Updated 4 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆143Updated 2 years ago