Library
- Trickest Library
- Modules
- Attack Surface Management
- Cloud Storage
- Containers
- Content Discovery
- Discovery
- Fuzzing
- Machine Learning
- Misconfiguration
- Network
- OSINT
- Passwords
- Recon
- Scanners
- Secret Discovery
- Social Engineering
- Static Code Analysis
- Threat Intelligence
- Utilities
- Vulnerabilities
- Vulnerability Scanning
Workflows
Explore a collection of powerful and efficient workflows in the Threat Intelligence category to enhance your productivity and security.
[GitHub Logs] Enhance repos
Enhance the data of each repository by retrieving additional information about them through the GitHub API.
[GitHub Logs] Enhance usernames
Enhance the data of each user by retrieving additional information about them through the GitHub API.
[GitHub Logs] Extract info from GitHub Archive
Download and parse the GH Archive dataset to extract user and repository information
Extensive OSINT
Collect IP addresses, open ports, vulnerabilities, technologies, DNS records, related domains, lookalike domains, documents, email addresses, and user accounts
OSINT - List of Users
Collect social accounts, GitHub repositories, and GitHub gists for a list of users
Shodan Threat Intelligence
Get information from Shodan API, organize it into meaningful categories, get alternative org names, gather hostnames, web servers, screenshot them and port scan all the collected IP addresses.
Enumerate GitHub resources
Enumerate a list of GitHub users' repositories and gists
Insiders
Archive of Potential Insider Threats - Check out example results on https://github.com/trickest/insiders
Enumerate GitHub users
Enumerate GitHub users connected to a particular organization