All Projects → urlRecon → Similar Projects or Alternatives

597 Open source projects that are alternatives of or similar to urlRecon

EventTranscriptParser
Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-29.03%)
Mutual labels:  forensics, cybersecurity
WiFi-Project
Pre-connection attacks, gaining access & post-connection attacks on WEP, WPA & WPA2. 🛰✔️
Stars: ✭ 22 (-29.03%)
Mutual labels:  forensics, cybersecurity
Pyiris Backdoor
PyIris-backdoor is a modular, stealthy and flexible remote-access-toolkit written completely in python used to command and control other systems. It is now in the beta stage, possibly perpetually. There are bugs still present in the framework, feel free to contribute or help me out with this project its still under active development >_>
Stars: ✭ 145 (+367.74%)
Mutual labels:  cybersecurity, reconnaissance
robot hacking manual
Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (+445.16%)
Mutual labels:  forensics, cybersecurity
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+712.9%)
Mutual labels:  cybersecurity, reconnaissance
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+854.84%)
Mutual labels:  cybersecurity, reconnaissance
go-spyse
The official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-19.35%)
Mutual labels:  cybersecurity, reconnaissance
targets
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
Stars: ✭ 85 (+174.19%)
Mutual labels:  cybersecurity, reconnaissance
marcellelee.github.io
No description or website provided.
Stars: ✭ 27 (-12.9%)
Mutual labels:  forensics, cybersecurity
Gitmonitor
One way to continuously monitor sensitive information that could be exposed on Github
Stars: ✭ 115 (+270.97%)
Mutual labels:  cybersecurity, reconnaissance
Awesome-CyberSec-Resources
An awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+780.65%)
Mutual labels:  cybersecurity, reconnaissance
Dfw1n Osint
Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (+103.23%)
Mutual labels:  forensics, cybersecurity
Memlabs
Educational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+2145.16%)
Mutual labels:  forensics, cybersecurity
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+1645.16%)
Mutual labels:  cybersecurity, reconnaissance
Ir Rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+903.23%)
Mutual labels:  forensics, cybersecurity
Pcapxray
❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Stars: ✭ 1,096 (+3435.48%)
Mutual labels:  forensics, cybersecurity
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+45.16%)
Mutual labels:  cybersecurity, reconnaissance
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+22100%)
Mutual labels:  cybersecurity, reconnaissance
phomber
Phomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (+90.32%)
Mutual labels:  cybersecurity, reconnaissance
URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+225.81%)
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+180.65%)
Certeagle
Weaponizing Live CT logs for automated monitoring of assets
Stars: ✭ 78 (+151.61%)
Mutual labels:  cybersecurity, reconnaissance
ad-privileged-audit
Provides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (+35.48%)
Mutual labels:  forensics, cybersecurity
Rebel Framework
Advanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (+490.32%)
Mutual labels:  forensics, reconnaissance
RdpCacheStitcher
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+467.74%)
Mutual labels:  forensics, cybersecurity
LogESP
Open Source SIEM (Security Information and Event Management system).
Stars: ✭ 162 (+422.58%)
Mutual labels:  forensics
awesome-cybersecurity-blueteam-cn
网络安全 · 攻防对抗 · 蓝队清单,中文版
Stars: ✭ 494 (+1493.55%)
Mutual labels:  cybersecurity
Hack4Squad
💀 A bash hacking and scanning framework.
Stars: ✭ 45 (+45.16%)
Mutual labels:  cybersecurity
CyberQueens
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩‍💻👨‍💻
Stars: ✭ 30 (-3.23%)
Mutual labels:  cybersecurity
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+4970.97%)
Mutual labels:  reconnaissance
paragon apfs sdk ce
Paragon APFS SDK Free
Stars: ✭ 97 (+212.9%)
Mutual labels:  forensics
lunasec
LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/
Stars: ✭ 1,261 (+3967.74%)
Mutual labels:  cybersecurity
cora-docs
CoRA Docs
Stars: ✭ 36 (+16.13%)
Mutual labels:  forensics
CRC-manipulator
Change CRC checksums of your files.
Stars: ✭ 73 (+135.48%)
Mutual labels:  forensics
cuc-wiki
个人教学 Wiki
Stars: ✭ 83 (+167.74%)
Mutual labels:  cybersecurity
mitreattack-python
A python module for working with ATT&CK
Stars: ✭ 208 (+570.97%)
Mutual labels:  cybersecurity
flydns
Related subdomains finder
Stars: ✭ 29 (-6.45%)
Mutual labels:  reconnaissance
SWELF
Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at https://github.com/ceramicskate0/SWELF/releases/latest.
Stars: ✭ 23 (-25.81%)
Mutual labels:  cybersecurity
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (+35.48%)
Mutual labels:  cybersecurity
Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+806.45%)
Mutual labels:  cybersecurity
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (+96.77%)
Mutual labels:  cybersecurity
Judge-Jury-and-Executable
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (+112.9%)
Mutual labels:  forensics
awesome-security-articles
This repository contains links to awesome security articles.
Stars: ✭ 33 (+6.45%)
Mutual labels:  cybersecurity
BlockHashLoc
Recover files using lists of blocks hashes, bypassing the File System entirely
Stars: ✭ 45 (+45.16%)
Mutual labels:  forensics
OSINTBookmarks
OSINT Bookmarks for Firefox / Chrome / Edge / Safari
Stars: ✭ 34 (+9.68%)
Mutual labels:  cybersecurity
jerseyctf-2021-challenges
JerseyCTF 2021
Stars: ✭ 22 (-29.03%)
Mutual labels:  cybersecurity
Recon-X
Advanced Reconnaissance tool to enumerate attacking surface of the target.
Stars: ✭ 27 (-12.9%)
Mutual labels:  reconnaissance
my-cybersecurity-notes
These are the notes i have been taking since i started learning about ethical hacking and cybersecurity
Stars: ✭ 13 (-58.06%)
Mutual labels:  cybersecurity
DevSecOps
Ultimate DevSecOps library
Stars: ✭ 4,450 (+14254.84%)
Mutual labels:  cybersecurity
Storm-Breaker
Social engineering tool [Access Webcam & Microphone & Location Finder] With Python
Stars: ✭ 1,489 (+4703.23%)
Mutual labels:  social-engineering
ADLES
Automated Deployment of Lab Environments System (ADLES)
Stars: ✭ 28 (-9.68%)
Mutual labels:  cybersecurity
qvm-create-windows-qube
Spin up new Windows qubes quickly, effortlessly and securely on Qubes OS
Stars: ✭ 267 (+761.29%)
Mutual labels:  cybersecurity
Palmprint-Recognition-in-the-Wild
No description or website provided.
Stars: ✭ 22 (-29.03%)
Mutual labels:  forensics
SourceWolf
Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥
Stars: ✭ 132 (+325.81%)
Mutual labels:  reconnaissance
DFIR Resources REvil Kaseya
Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack
Stars: ✭ 172 (+454.84%)
Mutual labels:  forensics
ehtk
Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (+90.32%)
Mutual labels:  cybersecurity
Malware-Zoo
Hashes of infamous malware
Stars: ✭ 18 (-41.94%)
Mutual labels:  cybersecurity
Packrat
Live system forensic collector
Stars: ✭ 16 (-48.39%)
Mutual labels:  forensics
qed
The scalable, auditable and high-performance tamper-evident log project
Stars: ✭ 87 (+180.65%)
Mutual labels:  forensics
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+2390.32%)
Mutual labels:  cybersecurity
1-60 of 597 similar projects