DnstwistDomain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+2010.81%)
Mutual labels: dns, domains, phishing, threat-intelligence
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-46.62%)
Mutual labels: phishing, threatintel, threat-intelligence
censys-recon-ngrecon-ng modules for Censys
Stars: ✭ 29 (-80.41%)
Mutual labels: penetration-testing, threatintel, threat-intelligence
TigersharkBilingual PhishingKit. TigerShark intergrates a vast array of various phishing tools and frameworks, from C2 servers, backdoors and delivery methods in multiple scripting languages in order to suit whatever your deployment needs may be.
Stars: ✭ 212 (+43.24%)
Mutual labels: penetration-testing, pentest-tool, phishing
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (+72.97%)
Mutual labels: phishing, threat-intelligence, threatintel
DomainfuzzDomain name permutation engine for detecting typo squatting, phishing and corporate espionage
Stars: ✭ 74 (-50%)
Mutual labels: dns, domains, phishing
Phishing catcherPhishing catcher using Certstream
Stars: ✭ 1,232 (+732.43%)
Mutual labels: phishing, threat-intelligence, threatintel
ErodirA fast web directory/file enumeration tool written in Rust
Stars: ✭ 94 (-36.49%)
Mutual labels: penetration-testing, pentest-tool
VailynA phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-30.41%)
Mutual labels: penetration-testing, pentest-tool
IntelowlIntel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+1328.38%)
Mutual labels: threat-intelligence, threatintel
Analyzer🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (-27.03%)
Mutual labels: phishing, threat-intelligence
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-39.86%)
Mutual labels: threat-intelligence, threatintel
Eyes.shLet's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-39.86%)
Mutual labels: penetration-testing, pentest-tool
Threatbus🚌 The missing link to connect open-source threat intelligence tools.
Stars: ✭ 139 (-6.08%)
Mutual labels: threat-intelligence, threatintel
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-41.89%)
Mutual labels: penetration-testing, pentest-tool
Punk.pyunix SSH post-exploitation 1337 tool
Stars: ✭ 107 (-27.7%)
Mutual labels: penetration-testing, pentest-tool
1hostsDNS filter-/blocklists | safe. private. clean. browsing!
Stars: ✭ 85 (-42.57%)
Mutual labels: dns, domains
BassBass grabs you those "extra resolvers" you are missing out on when performing Active DNS enumeration. Add anywhere from 100-6k resolvers to your "resolver.txt"
Stars: ✭ 104 (-29.73%)
Mutual labels: dns, domains
Mitm Scripts🔄 A collection of mitmproxy inline scripts
Stars: ✭ 109 (-26.35%)
Mutual labels: penetration-testing, pentest-tool
Misp DashboardA dashboard for a real-time overview of threat intelligence from MISP instances
Stars: ✭ 142 (-4.05%)
Mutual labels: threat-intelligence, threatintel