walimorris / opensquareLinks
OSINT Platform - Provides image analysis, digital footprints, video transcription and more. Retrieval Augmented Generation (RAG) capable platform
☆11Updated last year
Alternatives and similar repositories for opensquare
Users that are interested in opensquare are comparing it to the libraries listed below
Sorting:
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated last year
- FEAT, short for Factcheck Explorer Analysis Tool, is designed to facilitate the exploration, analysis, and visualization of fact-checking…☆30Updated last year
- Fetch information about a public Google document.☆13Updated 2 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- Real-time tracking of LoL (League of Legends) players activities☆15Updated 2 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆34Updated 11 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Web Path Finder☆62Updated last year
- Web application designed to raise user awareness and fortify online identities against tracking techniques.☆37Updated 7 months ago
- Real-time tracking of Sony Playstation (PSN) players activities☆20Updated 2 months ago
- Custom Binary Ninja Themes☆12Updated last year
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆39Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆43Updated last year
- ☆28Updated 2 years ago
- this nuclei template finds back up files☆21Updated last week
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated last week
- masscan with exclusive excludes☆58Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆19Updated 9 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆40Updated 2 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Terminal based fake identity generator.☆26Updated 2 years ago
- Simulate Windows EXE for Malware Research!☆18Updated 11 months ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆43Updated 3 months ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Updated 3 years ago