Online Telegram bot that collects a dossier on a person by username, checking for accounts on a huge number of sites and gathering all available information from web pages without requiring API keys. It is a powerful fork of Sherlock, supporting over 3000 sites with features like profile pages parsing, extraction of personal info, recursive search by new usernames, search by tags, censorship and captcha detection, and more.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
NetSPI Breach and Attack Simulation as a Service validates security control effectiveness through expert-led attack simulations mapped to the MITRE ATT&CK framework.
A toolkit to attack Office365, including tools for password spraying, password cracking, token manipulation, and exploiting vulnerabilities in Office365 APIs and services.
A tool to remove malicious artifacts from Microsoft Office documents, preventing malware infections and data breaches.
A VM for mobile application security testing, Android and iOS applications, with custom-made tools and scripts.
Pacu is an open-source AWS exploitation framework for offensive security testing against cloud environments.
RedWarden is a Cobalt Strike C2 Reverse proxy that evades detection by Blue Teams, AVs, EDRs, and scanners through packet inspection and malleable profile correlation.
C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.