Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.
☆697May 16, 2020Updated 5 years ago
Alternatives and similar repositories for Danger-zone
Users that are interested in Danger-zone are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Build interactive map of cameras from Shodan☆1,264Jun 28, 2020Updated 5 years ago
- ☆276Feb 20, 2021Updated 5 years ago
- Find open databases - Powered by Binaryedge.io☆1,435Jun 28, 2020Updated 5 years ago
- Collect information about email addresses from Pastebin☆39Jun 1, 2021Updated 4 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆149Jun 24, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- LeakLooker GUI - Discover, browse and monitor database/source code leaks☆314Dec 8, 2022Updated 3 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,271Nov 20, 2025Updated 4 months ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- Small script for retrieving incoming transactions based on provided hour period.☆14Jan 24, 2022Updated 4 years ago
- Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.☆280Dec 13, 2021Updated 4 years ago
- Track users across social media platform☆165Jan 26, 2021Updated 5 years ago
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 4 months ago
- Pastebin OSINT Harvester☆330Apr 27, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- Phishing catcher using Certstream☆1,798Aug 13, 2024Updated last year
- A fully functional DanderSpritz lab in 2 commands☆450May 16, 2019Updated 6 years ago
- A powerful target reconnaissance framework powered by graph theory.☆420Oct 21, 2022Updated 3 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,129Dec 7, 2022Updated 3 years ago
- Script lets you gather malicious software and c&c servers from open source platforms like Malshare, Malcode, Google, Cymon - vxvault, cyb…☆40Oct 29, 2019Updated 6 years ago
- CLI tool for open source and threat intelligence☆1,269Feb 27, 2025Updated last year
- The most complete open-source tool for Twitter intelligence analysis☆1,969Feb 6, 2019Updated 7 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Online hash checker for Virustotal and other services☆847Mar 21, 2025Updated last year
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,296Dec 23, 2018Updated 7 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,644Jun 20, 2024Updated last year
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆219Jul 17, 2020Updated 5 years ago
- 16,432 Free Yara rules created by☆389Jun 1, 2019Updated 6 years ago
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Scripts related to offensiveosint.io☆23Jun 5, 2020Updated 5 years ago
- Tracking the trackers. Draw connections between scripts and domains on website.☆19Jun 1, 2021Updated 4 years ago
- Incredibly fast crawler designed for OSINT.☆12,807Feb 10, 2026Updated 2 months ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,344Dec 13, 2022Updated 3 years ago
- Scanning pastebin with yara rules☆1,133Jan 10, 2026Updated 3 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,153Oct 19, 2025Updated 6 months ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆835May 22, 2023Updated 2 years ago