xakepnz / STRIKEWRITERLinks
Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.
☆12Updated 3 years ago
Alternatives and similar repositories for STRIKEWRITER
Users that are interested in STRIKEWRITER are comparing it to the libraries listed below
Sorting:
- A Passive DNS backend and collector☆31Updated 3 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Spam trap management☆23Updated last year
- A program to monitor network traffic and detect unauthorized sessions.☆42Updated 14 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 6 years ago
- A very simple Python script to take screenshots of websites☆18Updated 8 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 6 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Build a search engine from nmap XML files☆20Updated 11 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- Search bing with python☆12Updated 10 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- Various exploits☆10Updated 8 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Single-threaded epoll-based concurrent bulk whois client☆31Updated 7 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago