Hunt down social media accounts by username across social networks
-
Updated
May 6, 2025 - Python
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
Hunt down social media accounts by username across social networks
🕵️♂️ Collect a dossier on a person by username from thousands of sites
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Web path scanner
Exploitation Framework for Embedded Devices
🔥 Web-application firewalls (WAFs) from security standpoint.
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
Open Source Vulnerability Management Platform
The Network Execution Tool
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Vulnerability Intelligence Platform
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
CTF challenge (mostly pwn) files, scripts etc
Your Everyday Threat Intelligence
A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
📡 A python program to create a fake AP and sniff data.
Created by The cybersecurity community