Legend23's repositories
BlackEye-Python
BlackEye Phishing Kit in Python w Serveo Subdomain Creation
APT_CyberCriminal_Campagin_Collections
APT & CyberCriminal Campaign Collection
attack_range
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
buster
Find emails of a person and return info associated with them
cuckoo
Cuckoo Sandbox is an automated dynamic malware analysis system
djangohunter
Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information.
dnstwist
Domain name permutation engine for detecting typo squatting, phishing and corporate espionage
Gladys
🏡Your home assistant on your Raspberry Pi
handesk
A Powerful Laravel Help Desk and Lead Management App
hetty
Hetty is an HTTP toolkit for security research.
miteru
An experimental phishing kit detection tool
Modlishka
Modlishka. Reverse Proxy. Phishing NG.
ntTraceControl
Powershell Event Tracing Toolbox
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
OSweep
Don't Just Search OSINT. Sweep It.
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Phishing.Database
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
pi-hole
A black hole for Internet advertisements
security-apis
A collective list of public JSON APIs for use in security. Contributions welcome
Sigma-Hunting-App
A Splunk App containing Sigma detection rules, which can be updated from a Git repository.
Sooty
The SOC Analysts all-in-one CLI tool to automate and speed up workflow.
TheHive
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
TinyCheck
TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order to make it working, you need a computer with a Debian-like operating system and two Wi-Fi interfaces. The best choice is to use a Raspberry Pi (2+) a Wi-Fi dongle and a small touch screen. This tiny configuration (for less than $50) allows you to tap any Wi-Fi device, anywhere.
trape
People tracker on the Internet: OSINT analysis and research tool.
wesng
Windows Exploit Suggester - Next Generation
XSStrike
Most advanced XSS detection suite.