AmnestyTech / investigations
Indicators of Compromise from Amnesty International's cyber investigations
☆1,596Updated 5 months ago
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,178Updated this week
- A DFIR tool written in Python.☆1,046Updated 3 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆926Updated last year
- A Simple Ransomware Vaccine☆963Updated last year
- Indicators of stalkerware apps☆299Updated 3 weeks ago
- A tool for IDN homograph attacks and detection.☆735Updated 4 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,175Updated last week
- ☆1,267Updated 2 weeks ago
- Taking one back for Steve Irwin (๑•̀ㅂ•́)و☆1,000Updated 2 years ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆611Updated 3 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,925Updated 2 years ago
- ☆515Updated last year
- SunBurst DGA Decode Script☆207Updated 4 years ago
- A proof-of-concept Android application to detect and defeat some of the Cellebrite UFED forensic toolkit extraction techniques.☆337Updated 10 months ago
- An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments…☆1,703Updated 2 weeks ago
- Data set of top third party web domains with rich metadata about them☆1,569Updated this week
- A central place for apes to learn about stonks. This is not financial advice.☆409Updated 3 years ago
- 🔪 Leak git repositories from misconfigured websites☆1,571Updated 2 years ago
- CrackQ: A Python Hashcat cracking queue system☆936Updated 8 months ago
- Upload arbitrary data via Apple's Find My network.☆1,837Updated last year
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆918Updated 3 weeks ago
- ☆319Updated 3 years ago
- ☆367Updated 3 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,266Updated last year
- Fetch information about a public Google document.☆884Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,456Updated 9 months ago
- androidqf (Android Quick Forensics) helps quickly gathering forensic evidence from Android devices, in order to identify potential traces…☆269Updated last year
- ☆1,014Updated 2 weeks ago
- ☆2,505Updated 2 years ago