A collection of security tools, automation scripts, and utilities I’ve developed and use regularly. All tools are cross-platform where possible and focus on defensive security, monitoring, and automation.
OSINT Intelligence Framework
Comprehensive OSINT Collection Suite
Language: Python
Purpose: All-in-one Open Source Intelligence gathering framework for security research
cd scripts/osint-framework
python3 osint.py --domain example.com
python3 osint.py --email user@example.com
python3 osint.py --username johndoe
python3 osint.py --ip 8.8.8.8
Features:
- Domain Intelligence - DNS enumeration, WHOIS, subdomain discovery, certificate transparency
- Email Intelligence - Validation, breach checking (EmailRep.io), reputation analysis
- IP Intelligence - Geolocation, ASN lookup, reputation checks, cloud provider detection
- Username Search - Cross-platform enumeration (20+ platforms: GitHub, Twitter, LinkedIn, etc.)
- Website Analysis - Headers, tech stack detection, SSL inspection, security compliance
- Metadata Extraction - EXIF data, PDF metadata, document analysis
API Requirements: Works with free APIs (no keys needed). Optional API keys for extended features.
Documentation: View on GitHub →
Network Security
License: MIT License (view) Usage Terms: Subject to Terms of Service
Port Scanner (Basic)
Language: Python
Purpose: Fast multi-threaded port scanner with service detection
GitHub: View Source →
python3 port_scanner.py target.com -p 1-1000 -t 100
Features:
- Multi-threaded scanning
- Service detection
- Banner grabbing
- Customizable timeout and thread count
Port Scanner (Enhanced)
Language: Python
Purpose: Advanced port scanner with colored output and filtering options
GitHub: View Source →
# Scan with colored output
python3 port_scanner_enhanced.py example.com -p 1-1000
# Show only open ports
python3 port_scanner_enhanced.py example.com -p 1-65535 --open-only
Features:
- All features from basic port scanner
- Color-coded output (green for open, red for closed)
--open-onlyflag for cleaner output- Better error handling and reporting
- Summary statistics
SSL/TLS Certificate Analyzer
Language: Python
Purpose: Analyze SSL/TLS certificates and security configurations
GitHub: View Source →
python3 ssl_analyzer.py example.com
Checks:
- Certificate validity and expiration
- TLS version in use
- Cipher suite details
- Subject and issuer information
- Subject Alternative Names (SAN)
Network Diagnostics Tool
Language: Python
Purpose: Comprehensive network diagnostics and troubleshooting
GitHub: View Source →
python3 network_diagnostics.py example.com --all
Features:
- DNS lookup
- Ping test
- Port connectivity checks
- Traceroute with cross-platform support
- Detects local vs. remote networks
- Smart timeouts
Security Monitoring
License: MIT License (view) Usage Terms: Subject to Terms of Service
Security Header Checker
Language: Python
Purpose: Validate HTTP security headers for web applications
GitHub: View Source →
python3 header_check.py https://example.com
Validates:
- Content-Security-Policy (CSP)
- Strict-Transport-Security (HSTS)
- X-Frame-Options
- X-Content-Type-Options
- Referrer-Policy
- Permissions-Policy
- X-XSS-Protection
Output: Security score (0-100%) with detailed findings
File Integrity Monitor
Language: Python
Purpose: Detect unauthorized file changes by comparing hashes to a baseline
GitHub: View Source →
# Create baseline
python3 file_integrity_monitor.py /var/www --create-baseline
# Check for changes
python3 file_integrity_monitor.py /var/www --check
Features:
- SHA-256 hash comparison
- Detects new, modified, and deleted files
- Pattern-based file exclusions
- Baseline storage in JSON format
- Color-coded change reporting
Threat Intelligence Checker
Language: Python
Purpose: Check IP addresses against AbuseIPDB threat intelligence feed
GitHub: View Source →
# Check single IP
python3 threat_intel_checker.py -i 192.168.1.1
# Check multiple IPs
python3 threat_intel_checker.py -i 8.8.8.8 1.1.1.1
# Check IPs from file
python3 threat_intel_checker.py -f suspicious_ips.txt
Features:
- AbuseIPDB API integration
- Abuse confidence scoring
- Malicious IP detection
- Batch IP checking
- Detailed threat reports (country, ISP, last reported)
Requirements: Free AbuseIPDB API key
Log Analyzer
Language: Python
Purpose: Parse and analyze security logs for suspicious activity
GitHub: View Source →
# Analyze SSH logs
python3 log_analyzer.py -f /var/log/auth.log -t ssh
# Analyze Apache logs
python3 log_analyzer.py -f /var/log/apache2/access.log -t apache
Features:
- SSH Log Analysis: Failed login attempts, suspicious patterns, IP frequency
- Apache Log Analysis: 4xx/5xx errors, attack patterns, sensitive file access
- Pattern-based threat detection
- IP-based attack tracking
- Color-coded findings
Detects:
- Brute force attempts
- SQL injection patterns
- Path traversal attempts
- Sensitive file access (/.env, /config, /admin)
AWS S3 Security Checker
Language: Python
Purpose: Audit AWS S3 buckets for security misconfigurations
GitHub: View Source →
# Check single bucket
python3 s3_security_checker.py my-bucket
# Check with specific AWS profile
python3 s3_security_checker.py my-bucket --profile production
Validates:
- Public access block configuration
- Bucket ACL settings
- Bucket policy analysis
- Encryption at rest
- Versioning status
- Logging configuration
- MFA delete protection
Features:
- Automatic website hosting detection
- Context-aware recommendations
- Color-coded security status
- AWS profile support
Requirements: AWS credentials configured, boto3 Python library
Linux Security Audit
Language: Bash
Purpose: Generate security audit report from Linux system logs
GitHub: View Source →
./audit_security.sh -t 24 -o /var/reports/security-audit.html
Detects:
- Failed SSH login attempts
- Successful root logins
- Sudo command usage
- New user accounts created
- Failed sudo attempts
- Unauthorized SSH keys
- Open network ports
Export: HTML report with color-coded warnings
Windows Security Audit
Language: PowerShell
Purpose: Comprehensive Windows Event Log security analysis
GitHub: View Source →
.\Get-SecurityAuditReport.ps1 -ComputerName "SERVER01" -Hours 48 -ExportPath "C:\Reports\security.html"
Monitors:
- Failed login attempts (Event ID 4625)
- Account lockouts (Event ID 4740)
- New account creation (Event ID 4720)
- Account deletion (Event ID 4726)
- Privilege escalation (Event ID 4672)
- Policy changes
Output: Terminal output + optional HTML report
System Monitoring & Reporting
License: MIT License (view) Usage Terms: Subject to Terms of Service
System Health Check
Language: Python
Purpose: Cross-platform system health monitoring (Windows, Linux, macOS)
GitHub: View Source →
python3 system_health_check.py --cpu-warn 80 --mem-warn 80 --export-json /tmp/health.json
Monitors:
- CPU usage with configurable thresholds
- Memory usage and availability
- Disk space across all partitions
- Network connectivity (internet check)
- System uptime
Export: JSON or CSV format Exit Codes: 0 (healthy), 1 (warning), 2 (critical)
System Inventory
Language: Python
Purpose: Generate comprehensive system inventory reports
GitHub: View Source →
python3 system_inventory.py --json inventory.json --csv inventory.csv
Collects:
- System information (OS, architecture, processor)
- CPU details (cores, frequency)
- Memory statistics
- Disk information (all partitions)
- Network interfaces and IP addresses
- Boot time and uptime
Export: JSON and/or CSV format
Automation & Infrastructure
License: MIT License (view) Usage Terms: Subject to Terms of Service
Backup Automation Suite
Language: Bash
Purpose: Automated backup solution with compression and rotation
GitHub: View Source →
./backup_automation.sh /etc/backup.conf
Features:
- Incremental and full tar backups
- Gzip compression
- Configurable retention policy
- Pattern-based exclusions
- Size reporting
- Error handling
Configuration:
- Source/destination directories
- Retention period (days)
- Compression settings
- Exclude patterns
Microsoft 365 Health Monitor
Language: PowerShell
Purpose: Monitor Microsoft 365 service health and generate reports
GitHub: View Source →
.\m365_health_monitor.ps1 -TenantId "your-tenant-id" -ReportPath "C:\Reports"
Monitors:
- Service health status (all M365 services)
- Active incidents
- Service degradation
- HTML report generation
Requires: Microsoft.Graph PowerShell module
Development & Testing
API Endpoint Testing
Purpose: Test and validate API endpoint behavior Status: Coming soon
Usage Requirements
Python Tools
Most Python tools require:
- Python 3.7+
- Standard library (included)
- Optional dependencies (install as needed):
psutil- System monitoring toolscolorama- Colored terminal outputrequests- HTTP/API tools (OSINT, threat intel, header checker)boto3- AWS S3 security checker
# Install all optional dependencies
pip install psutil colorama requests boto3
# Or install individually as needed
pip install psutil colorama requests
pip install boto3 # For AWS tools only
Bash Tools
- Bash 4.0+ (macOS ships with Bash 3.2, use Homebrew for newer version)
- Standard Unix utilities (grep, awk, sed, tar, gzip)
PowerShell Tools
- PowerShell 5.1+ (Windows)
- PowerShell 7+ (Cross-platform)
- Appropriate Windows event log permissions
Available on GitHub
All tools listed on this page are available in this website’s repository: GitHub Repository: github.com/Glyph-SH/website
Browse the scripts directly:
Note: Some enterprise tools are private or under NDA
Security Notice
All tools are designed for defensive security purposes only:
- Security auditing your own systems
- Monitoring authorized infrastructure
- Compliance and vulnerability scanning
- Unauthorized access or exploitation is prohibited
- Attacking third-party systems is prohibited
Always obtain proper authorization before scanning or testing any systems.
Legal & Compliance: Before using any tools, review our legal documentation:
- Terms of Service - Usage requirements and legal obligations
- Software License - MIT License and third-party licenses
- Privacy Policy - Data collection practices
Contributing
Found a bug or have a feature request? Feel free to:
- Open an issue on GitHub
- Submit a pull request
- Contact me via email
License
Unless otherwise specified, tools are released under MIT License.
See the Software License page for complete license text and third-party license information, or check individual tool repositories for specific licensing details.
Last Updated: October 31, 2025