seclook
webstor
seclook | webstor | |
---|---|---|
2 | 5 | |
17 | 150 | |
- | - | |
7.1 | 2.8 | |
3 months ago | about 2 months ago | |
Swift | Python | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
seclook
-
Show HN: Automatic security lookups from your clipboard
seclook is a macOS/Swift app that sits in the background and monitors your clipboard, sending any IP, SHA2/MD5 hash, or domain to VirusTotal and AbuseIPDB. If any scanned item has a bad reputation score, you get a notification!
This app is geared towards SOC analysts to notify you if you copy anything malicious as you are working through an alert/random day-to-day stuff.
https://seclook.app
https://github.com/ackatz/seclook/
- Show HN: Seclook – Simple security lookups via CLI
webstor
- Show HN: WebStor – Enumerate all your web technologies and find zero-days fast
- GitHub - RossGeerlings/webstor: A script to quickly enumerate all websites across all of your organization's networks, store their responses, and query for known web technologies, such as those with zero-day vulnerabilities.
- WebStor, a script to quickly enumerate all websites across all of your organization's networks, store their responses, and query for known web technologies, such as those with zero-day vulnerabilities.
-
WebStor, a new open source utility to quickly ID web technologies across an organization's networks
You can check it out at GitHub at: https://github.com/RossGeerlings/webstor
What are some alternatives?
AutoPWN-Suite - AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
CloudSniffer - CloudSniffer is a powerful tool designed to aid in the discovery of the real IP address of a website protected by Cloudflare. It leverages brute force techniques by testing a list of IP addresses and analyzing the status codes returned by the server to uncover the actual IP address of the target website.
targets - A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.
SpiderSuite - Advance web security spider/crawler
faraday - Open Source Vulnerability Management Platform
OTE - OSINT Template Engine
haipy - Haipy - Hash Identifier for Python - derived from haiti
csprecon - Discover new target domains using Content Security Policy
cerberus - Cerberus is another simple stressing tool simulating DDoS attacks.
detectify-cves - Find CVEs that don't have a Detectify modules.
google-search - Returns results from Google search.
rengine - reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with minimal configuration and with the help of reNgine's correlation, it just makes recon effortless.