utkusen / jeopardizeLinks
a low(zero) cost threat intelligence&response tool against phishing domains
☆156Updated 2 years ago
Alternatives and similar repositories for jeopardize
Users that are interested in jeopardize are comparing it to the libraries listed below
Sorting:
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- ADAPT is a tool that performs automated Penetration Testing for WebApps.☆190Updated 5 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- thethe☆116Updated 4 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆91Updated 2 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment☆139Updated 3 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆250Updated 5 years ago
- Personalized wordlist generator with NLP, by analyzing tweets. (A.K.A crunch2049)☆135Updated 5 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- GreyNoise Query Language☆82Updated 6 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Updated 5 years ago
- Automated Tactics Techniques & Procedures☆255Updated 2 years ago
- ☆129Updated 4 years ago
- Lure - User Recon Automation for GoPhish☆165Updated last year
- Linux Incident Response☆90Updated 5 years ago
- A testing framework for mail security and filtering solutions.☆245Updated last year
- Simulating Adversary Operations☆93Updated 7 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆80Updated 5 years ago
- This repo contains logstash of various honeypots☆174Updated 5 years ago
- Collection of scripts & fingerprinting tricks for Shodan.io☆253Updated 5 years ago
- LinkedIn reconnaissance tool☆54Updated 3 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆205Updated 6 years ago
- A curated list of tools, papers and techniques for Windows exploitation and incident response.☆40Updated 9 years ago
- Pivoting Frontend for Pre-Seeded Password Databases☆131Updated 2 weeks ago
- Endpoint detection & Malware analysis software☆230Updated 5 years ago
- Detect and log CVE-2019-19781 scan and exploitation attempts.☆116Updated 5 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆101Updated 3 years ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago