AmnestyTech / investigations
Indicators of Compromise from Amnesty International's cyber investigations
☆1,578Updated last month
Alternatives and similar repositories for investigations:
Users that are interested in investigations are comparing it to the libraries listed below
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆10,681Updated this week
- ☆1,258Updated last year
- A DFIR tool written in Python.☆1,044Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,143Updated last month
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆918Updated last year
- A proof-of-concept Android application to detect and defeat some of the Cellebrite UFED forensic toolkit extraction techniques.☆332Updated 7 months ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆602Updated 2 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 3 years ago
- Fetch information about a public Google document.☆862Updated last year
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,535Updated 3 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,897Updated 2 years ago
- Indicators of stalkerware apps☆279Updated 3 weeks ago
- audible feedback on just how much your browsing feeds into google☆2,243Updated 9 months ago
- 📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-de…☆1,375Updated 2 years ago
- A community sourced list of log4j-affected software☆1,119Updated 2 years ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆1,889Updated 5 months ago
- Recover old Snaps that have “disappeared” from Snapchat☆429Updated 3 years ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,393Updated 6 months ago
- ☆419Updated 11 months ago
- Various tips & tricks☆3,226Updated last week
- 🔪 Leak git repositories from misconfigured websites☆1,556Updated 2 years ago
- Reverse engineered Parler API☆388Updated 4 years ago
- CLI tool for open source and threat intelligence☆1,188Updated last month
- OSINT tool - gets data from services like shodan, censys etc. in one app☆639Updated last year
- Extract and Visualize Data from URLs using Unfurl☆624Updated last month
- ☆318Updated 3 years ago
- ☆1,116Updated 4 years ago
- ☆89Updated 4 years ago
- Tafferugli is a Twitter Analysis Framework☆361Updated 2 years ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆878Updated last week