0xjet / cccLinks
A short graduate course on cybercrime, cyberespionage, and cyberoperations
☆81Updated 2 months ago
Alternatives and similar repositories for ccc
Users that are interested in ccc are comparing it to the libraries listed below
Sorting:
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 4 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆132Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆121Updated 4 months ago
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- The most complete code auditing platform with thousands of real-world challenges☆125Updated last month
- ☆40Updated 7 months ago
- ☆119Updated 2 months ago
- ☆28Updated 11 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- ☆54Updated 6 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆100Updated 3 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆42Updated 3 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ☆46Updated 5 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- ☆64Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆147Updated last year
- Capture screenshots of onion services on an onion service.☆70Updated last year
- Protection against HTML smuggling attacks.☆96Updated 3 weeks ago
- A repository of credential stealer formats☆222Updated last month
- This is an AD pentest tools collection☆58Updated last year
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 7 months ago
- ☆104Updated last month
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆57Updated 9 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated 10 months ago
- An archive of 0day.today exploits☆62Updated 2 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆67Updated last month