AmnestyTech / investigationsLinks
Indicators of Compromise from Amnesty International's cyber investigations
☆1,614Updated 8 months ago
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,539Updated last week
- A DFIR tool written in Python.☆1,050Updated 4 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,190Updated 3 months ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆933Updated 2 years ago
- A central place for apes to learn about stonks. This is not financial advice.☆410Updated 3 years ago
- CrackQ: A Python Hashcat cracking queue system☆937Updated 11 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,378Updated 5 months ago
- ☆1,275Updated 4 months ago
- ☆320Updated 4 years ago
- An open-source digital image forensic toolset☆2,972Updated last month
- Extract and Visualize Data from URLs using Unfurl☆687Updated this week
- Fetch information about a public Google document.☆956Updated last year
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆617Updated 3 years ago
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,537Updated 4 years ago
- Indicators of stalkerware apps☆318Updated last week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,499Updated last year
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,281Updated 2 years ago
- A Simple Ransomware Vaccine☆969Updated last year
- 🔪 Leak git repositories from misconfigured websites☆1,584Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,397Updated last month
- IntelOwl: manage your Threat Intelligence at scale☆4,289Updated this week
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,283Updated 2 years ago
- Apple Pattern of Life Lazy Output'er☆605Updated last year
- iOS Logs, Events, And Plist Parser☆926Updated this week
- Detector for Log4Shell exploitation attempts☆730Updated 3 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,949Updated 2 years ago
- A tool for IDN homograph attacks and detection.☆738Updated 4 years ago
- Canarytokens helps track activity and actions on your network.☆1,923Updated this week
- An open letter against Apple's new privacy-invasive client-side content scanning.☆631Updated 2 years ago
- A list of free and open forensics analysis tools and other resources☆1,409Updated 4 months ago