AmnestyTech / investigationsLinks
Indicators of Compromise from Amnesty International's cyber investigations
☆1,639Updated last year
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆12,047Updated last week
- ☆1,281Updated 8 months ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆937Updated 2 years ago
- A DFIR tool written in Python.☆1,054Updated 4 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,201Updated 8 months ago
- A central place for apes to learn about stonks. This is not financial advice.☆410Updated 4 years ago
- Taking one back for Steve Irwin (๑•̀ㅂ•́)و☆1,049Updated 2 years ago
- ☆323Updated 4 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,958Updated 3 years ago
- CrackQ: A Python Hashcat cracking queue system☆941Updated last year
- Reverse engineered Parler API☆385Updated 5 years ago
- CLOSE ACCESS DENIAL.☆1,536Updated this week
- Fetch information about a public Google document.☆986Updated 2 years ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆616Updated 3 years ago
- Archiving Parler.☆228Updated 5 years ago
- Indicators of stalkerware apps☆337Updated 3 months ago
- Extract and Visualize Data from URLs using Unfurl☆707Updated this week
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,392Updated 10 months ago
- ☆453Updated last year
- IntelOwl: manage your Threat Intelligence at scale☆4,422Updated this week
- ☆537Updated 2 years ago
- A stealth AirTag clone that bypasses all of Apple's tracking protection features☆1,221Updated 3 years ago
- 🔪 Leak git repositories from misconfigured websites☆1,593Updated last month
- A tool for IDN homograph attacks and detection.☆741Updated 4 years ago
- Data set of top third party web domains with rich metadata about them☆1,661Updated this week
- A Simple Ransomware Vaccine☆972Updated 2 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.☆627Updated 2 years ago
- An open-source digital image forensic toolset☆3,088Updated 6 months ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆374Updated 4 years ago
- Upload arbitrary data via Apple's Find My network.☆1,869Updated 2 years ago