AmnestyTech / investigationsLinks
Indicators of Compromise from Amnesty International's cyber investigations
☆1,605Updated 6 months ago
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,286Updated last week
- Fetch information about a public Google document.☆905Updated last year
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆926Updated 2 years ago
- CLI tool for open source and threat intelligence☆1,221Updated 4 months ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- Indicators of stalkerware apps☆312Updated this week
- VirusTotal Command Line Interface☆953Updated 3 weeks ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,059Updated last month
- ☆561Updated 2 years ago
- An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments…☆1,708Updated last week
- A tool for IDN homograph attacks and detection.☆737Updated 4 years ago
- ☆1,271Updated last month
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆848Updated 2 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,182Updated last month
- A DFIR tool written in Python.☆1,048Updated 4 years ago
- Extract and Visualize Data from URLs using Unfurl☆676Updated last month
- A Simple Ransomware Vaccine☆965Updated last year
- An open-source digital image forensic toolset☆2,936Updated last month
- A central place for apes to learn about stonks. This is not financial advice.☆410Updated 3 years ago
- ☆533Updated last year
- Warning lists to inform users of MISP about potential false-positives or other information in indicators☆577Updated last week
- CrackQ: A Python Hashcat cracking queue system☆937Updated 9 months ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,359Updated 3 months ago
- log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vul…☆1,281Updated 2 years ago
- AIL framework - Analysis Information Leak framework☆751Updated last week
- Cybersecurity Evaluation Tool☆1,584Updated this week
- Semi-automatic OSINT framework and package manager☆2,255Updated 4 months ago
- 🐧 Abuse of Google Colab for cracking hashes.☆948Updated last year
- This repository contains the data behind our Security, Privacy and Parental Control features.☆658Updated 2 years ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆2,005Updated 10 months ago