SpiderFoot automates OSINT for threat intelligence
SpiderFoot is an open-source intelligence tool on GitHub, with a web interface and command-line access. It aids in reconnaissance and identifying online vulnerabilities with over 200 modules. Installation details are on the SpiderFoot GitHub repository.
Read original articleSpiderFoot is an open-source intelligence automation tool available on GitHub. It offers a web-based interface and command-line access, written in Python 3 under an MIT license. With over 200 modules, SpiderFoot can perform tasks like host enumeration, threat intelligence queries, and dark web searches. It serves both offensive and defensive purposes, aiding in reconnaissance or identifying potential online vulnerabilities. Installation requires Python 3.7 and specific libraries, achievable through stable builds or git cloning. Detailed instructions are available on the SpiderFoot GitHub repository. For further details, documentation, and updates, the SpiderFoot project website and Twitter handle provide additional resources.
Related
OpenSnitch: GNU/Linux interactive application firewall inspired by Little Snitch
OpenSnitch is a versatile GNU/Linux application firewall with outbound connections filtering, ad blocking, and SIEM integration. It offers deb/rpm packages on GitHub, press coverage, connection review, donations, and translation opportunities.
Simple ways to find exposed sensitive information
Various methods to find exposed sensitive information are discussed, including search engine dorking, Github searches, and PublicWWW for hardcoded API keys. Risks of misconfigured AWS S3 buckets are highlighted, stressing data confidentiality.
Show HN: I made tool that let's you see everything about any website
Web-Check is a free tool by Alicia Sykes, offering website details through URL scans. It requires JavaScript activation. Licensed under MIT, it aids users with website insights.
Show HN: ViperIDE – An Innovative MicroPython IDE for Web and Mobile
ViperIDE is a modern MicroPython IDE for web and mobile platforms. It offers features like no installation required, cross-platform connectivity, file editor, package manager, terminal/REPL, and device support. Explore on ViperIDE's website or GitHub.
Python packaging scenarios by the creators of ruff
The GitHub URL provides details on "packse," a Python packaging tool. It includes installation, usage, building, publishing, running a package index, serving scenarios, testing, exporting, and writing new scenarios. For further assistance, inquire within.
That is too bad as it looks like quite a useful scanning tool, hopefully development picks back up.
Related
OpenSnitch: GNU/Linux interactive application firewall inspired by Little Snitch
OpenSnitch is a versatile GNU/Linux application firewall with outbound connections filtering, ad blocking, and SIEM integration. It offers deb/rpm packages on GitHub, press coverage, connection review, donations, and translation opportunities.
Simple ways to find exposed sensitive information
Various methods to find exposed sensitive information are discussed, including search engine dorking, Github searches, and PublicWWW for hardcoded API keys. Risks of misconfigured AWS S3 buckets are highlighted, stressing data confidentiality.
Show HN: I made tool that let's you see everything about any website
Web-Check is a free tool by Alicia Sykes, offering website details through URL scans. It requires JavaScript activation. Licensed under MIT, it aids users with website insights.
Show HN: ViperIDE – An Innovative MicroPython IDE for Web and Mobile
ViperIDE is a modern MicroPython IDE for web and mobile platforms. It offers features like no installation required, cross-platform connectivity, file editor, package manager, terminal/REPL, and device support. Explore on ViperIDE's website or GitHub.
Python packaging scenarios by the creators of ruff
The GitHub URL provides details on "packse," a Python packaging tool. It includes installation, usage, building, publishing, running a package index, serving scenarios, testing, exporting, and writing new scenarios. For further assistance, inquire within.