Indicators of Compromise from Amnesty International's cyber investigations
☆1,645Dec 16, 2024Updated last year
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆12,191Updated this week
- A beacon generator using Cobalt Strike and a variety of tools.☆448Aug 10, 2021Updated 4 years ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,186Aug 15, 2024Updated last year
- Linux OS for Azure 1P services and edge appliances☆4,583Updated this week
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,858Sep 10, 2025Updated 5 months ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,547Jan 20, 2026Updated last month
- ⚠️ This repo has moved to https://github.com/LibreScore/dl-librescore ⚠️ | Download sheet music (MSCZ, PDF, MusicXML, MIDI, MP3, download…☆2,752Feb 28, 2023Updated 3 years ago
- 🕵️♂️ Offensive Google framework.☆18,493Feb 5, 2026Updated last month
- A list of allowlists and denylists converted to adblock style syntax☆19Jan 20, 2023Updated 3 years ago
- 🐸 Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell …☆7,153Oct 31, 2023Updated 2 years ago
- Ghidra is a software reverse engineering (SRE) framework☆65,303Updated this week
- A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE☆805May 19, 2024Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,544Jul 28, 2024Updated last year
- Information gathering framework for phone numbers☆15,957Jan 6, 2026Updated 2 months ago
- Index and collection of MVT compatibile indicators of compromise.☆124Feb 18, 2026Updated 2 weeks ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,211May 10, 2025Updated 9 months ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- Reverse Engineer's Toolkit☆5,172May 1, 2025Updated 10 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,690Updated this week
- A DFIR tool written in Python.☆1,053Jun 9, 2021Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,607Nov 14, 2025Updated 3 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,111Mar 12, 2024Updated last year
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆20,479Feb 3, 2026Updated last month
- Indicators of Compromises (IOC) of our various investigations☆1,922Feb 20, 2026Updated 2 weeks ago
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,862Updated this week
- Main Sigma Rule Repository☆10,156Updated this week
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- An open-source digital image forensic toolset☆3,099Jul 14, 2025Updated 7 months ago
- A curated list of amazingly awesome OSINT☆25,040Feb 26, 2026Updated last week
- A little tool to play with Windows security☆21,300May 11, 2025Updated 9 months ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆923May 20, 2024Updated last year
- IntelOwl: manage your Threat Intelligence at scale☆4,481Updated this week
- Upload arbitrary data via Apple's Find My network.☆1,870Nov 13, 2023Updated 2 years ago
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆34,190Updated this week
- Offensive Software Exploitation Course☆2,393May 31, 2023Updated 2 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,929Updated this week
- An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, fo…☆16,339Feb 23, 2023Updated 3 years ago
- Infection Monkey - An open-source adversary emulation platform☆6,963May 1, 2025Updated 10 months ago
- Defences against Cobalt Strike☆1,296Jul 14, 2022Updated 3 years ago