AmnestyTech / investigationsLinks
Indicators of Compromise from Amnesty International's cyber investigations
☆1,621Updated 9 months ago
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,650Updated this week
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆935Updated 2 years ago
- A central place for apes to learn about stonks. This is not financial advice.☆410Updated 3 years ago
- ☆1,277Updated 5 months ago
- A DFIR tool written in Python.☆1,053Updated 4 years ago
- ☆321Updated 4 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,194Updated 4 months ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆617Updated 3 years ago
- Indicators of stalkerware apps☆322Updated last month
- An open letter against Apple's new privacy-invasive client-side content scanning.☆631Updated 2 years ago
- A community sourced list of log4j-affected software☆1,127Updated 2 years ago
- Detector for Log4Shell exploitation attempts☆731Updated 3 years ago
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,538Updated 4 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,383Updated 7 months ago
- CrackQ: A Python Hashcat cracking queue system☆939Updated last year
- Trojan Source: Invisible Vulnerabilities☆1,269Updated 2 years ago
- An open-source digital image forensic toolset☆2,978Updated 2 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,950Updated 2 years ago
- This is a list of substantial, commercial-or-social-good mainstream websites which provide onion services.☆1,963Updated this week
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆446Updated last year
- Technical notes from investigations into COVID-19 contact-tracing apps☆50Updated 5 years ago
- A Simple Ransomware Vaccine☆970Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,509Updated last year
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,892Updated 3 years ago
- A proof-of-concept Android application to detect and defeat some of the Cellebrite UFED forensic toolkit extraction techniques.☆342Updated last year
- ☆445Updated last year
- ☆1,113Updated 4 years ago
- Fetch information about a public Google document.☆969Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,485Updated 3 months ago
- A tool for IDN homograph attacks and detection.☆739Updated 4 years ago