AmnestyTech / investigations
Indicators from Amnesty International's investigations
☆1,548Updated 4 months ago
Related projects: ⓘ
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆10,293Updated this week
- TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access p…☆3,078Updated 4 months ago
- ☆1,224Updated 11 months ago
- Taking one back for Steve Irwin (๑•̀ㅂ•́)و☆963Updated last year
- An open-source digital image forensic toolset☆2,618Updated 2 weeks ago
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,530Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,113Updated 3 months ago
- A Simple Ransomware Vaccine☆943Updated 10 months ago
- ☆2,079Updated this week
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆3,485Updated this week
- Indicators of stalkerware apps☆259Updated 2 weeks ago
- Protect yourself from being tracked 🌍 by AirTags 🏷 and Find My accessories 📍☆1,912Updated this week
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,897Updated last year
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆910Updated last year
- ☆316Updated 3 years ago
- Network Defense System.☆1,400Updated last week
- A list of free and open forensics analysis tools and other resources☆1,017Updated 10 months ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,324Updated 2 months ago
- IntelOwl: manage your Threat Intelligence at scale☆3,760Updated this week
- A DFIR tool written in Python.☆1,039Updated 3 years ago
- CLI tool for open source and threat intelligence☆1,165Updated 9 months ago
- Canarytokens helps track activity and actions on your network.☆1,728Updated last week
- ☆560Updated last year
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,596Updated 8 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,237Updated last year
- This is the development tree. Production downloads are at:☆1,079Updated 4 months ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆377Updated 3 years ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆898Updated this week
- CrackQ: A Python Hashcat cracking queue system☆922Updated 2 weeks ago
- A community sourced list of log4j-affected software☆1,118Updated last year