AmnestyTech / investigationsLinks
Indicators of Compromise from Amnesty International's cyber investigations
☆1,611Updated 7 months ago
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,481Updated last week
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆932Updated 2 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,184Updated 3 months ago
- A DFIR tool written in Python.☆1,050Updated 4 years ago
- A central place for apes to learn about stonks. This is not financial advice.☆410Updated 3 years ago
- An open-source digital image forensic toolset☆2,960Updated 3 weeks ago
- ☆1,273Updated 3 months ago
- ☆1,046Updated this week
- Taking one back for Steve Irwin (๑•̀ㅂ•́)و☆1,015Updated 2 years ago
- A Simple Ransomware Vaccine☆966Updated last year
- IntelOwl: manage your Threat Intelligence at scale☆4,229Updated this week
- ☆319Updated 4 years ago
- Tafferugli is a Twitter Analysis Framework☆361Updated 3 years ago
- Extract and Visualize Data from URLs using Unfurl☆683Updated this week
- Reverse engineered Parler API☆387Updated 4 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.☆631Updated 2 years ago
- Fetch information about a public Google document.☆945Updated last year
- VirusTotal Command Line Interface☆983Updated 2 months ago
- Indicators of stalkerware apps☆316Updated last week
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,536Updated 3 years ago
- CrackQ: A Python Hashcat cracking queue system☆937Updated 11 months ago
- A tool for IDN homograph attacks and detection.☆738Updated 4 years ago
- 💥 A collection of all documents leaked by former NSA contractor and whistleblower Edward Snowden.☆1,206Updated 5 years ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆617Updated 3 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,890Updated 3 years ago
- ☆2,666Updated last year
- CLI tool for open source and threat intelligence☆1,237Updated 5 months ago
- An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments…☆1,716Updated last month
- Trojan Source: Invisible Vulnerabilities☆1,265Updated 2 years ago