0xjet / cccLinks
A short graduate course on cybercrime, cyberespionage, and cyberoperations
☆80Updated last month
Alternatives and similar repositories for ccc
Users that are interested in ccc are comparing it to the libraries listed below
Sorting:
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆130Updated last year
- ☆28Updated 9 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 3 months ago
- ☆40Updated 6 months ago
- A collection of tools that I use in CTF's or for assessments☆100Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- ☆44Updated 4 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆83Updated 2 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆66Updated last year
- ☆55Updated last year
- ☆54Updated 5 months ago
- ☆102Updated 2 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆96Updated 2 months ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆33Updated 10 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- Challenge Python☆19Updated 2 years ago
- Track C2 servers, tools, and botnets over time by framework and location☆40Updated 4 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 8 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆120Updated 3 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆47Updated 3 weeks ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆32Updated this week
- ☆40Updated 6 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated 9 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆68Updated 3 weeks ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- AI-Powered Dark Web OSINT Tool☆78Updated this week