SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
-
Updated
Apr 28, 2024 - Python
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! 🧙♀️
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Automated Adversary Emulation Platform
Open Source Vulnerability Management Platform
An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).
🛡️ Make your web services secure by default !
IntelOwl: manage your Threat Intelligence at scale
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
An OSINT tool to search for accounts by username in social networks.
Interesting APT Report Collection And Some Special IOC
OSINT tool for finding profiles by username
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
❄️ PcapXray - A Network Forensics Tool - To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction
Fix Inventory consolidates user, resource, and configuration data from your cloud environments into a unified, graph-based asset inventory.
Add a description, image, and links to the cybersecurity topic page so that developers can more easily learn about it.
To associate your repository with the cybersecurity topic, visit your repo's landing page and select "manage topics."