0xjet / cccLinks
A short graduate course on cybercrime, cyberespionage, and cyberoperations
☆83Updated 3 weeks ago
Alternatives and similar repositories for ccc
Users that are interested in ccc are comparing it to the libraries listed below
Sorting:
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆142Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆53Updated 9 months ago
- ☆102Updated 3 months ago
- ☆135Updated 6 months ago
- ☆44Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 9 months ago
- ☆49Updated 10 months ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated last week
- ☆56Updated 11 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 7 months ago
- ☆28Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆103Updated 8 months ago
- A collection of tools that I use in CTF's or for assessments☆103Updated 10 months ago
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 6 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆65Updated this week
- This is an AD pentest tools collection☆59Updated last year
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆80Updated 3 months ago
- An archive of 0day.today exploits☆326Updated 5 months ago
- Tor onion address lookup☆58Updated 4 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆62Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 8 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆37Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆67Updated 5 months ago