AmnestyTech / investigations
Indicators of Compromise from Amnesty International's cyber investigations
☆1,584Updated 3 months ago
Alternatives and similar repositories for investigations:
Users that are interested in investigations are comparing it to the libraries listed below
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,039Updated 3 weeks ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆921Updated last year
- ☆318Updated 3 years ago
- ☆1,262Updated last month
- VirusTotal Command Line Interface☆895Updated 7 months ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆1,927Updated 7 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,170Updated last month
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 3 years ago
- A tool for IDN homograph attacks and detection.☆734Updated 4 years ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆610Updated 3 years ago
- Indicators of stalkerware apps☆293Updated this week
- Upload arbitrary data via Apple's Find My network.☆1,827Updated last year
- Detector for Log4Shell exploitation attempts☆732Updated 3 years ago
- Fetch information about a public Google document.☆870Updated last year
- An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments…☆1,691Updated 3 weeks ago
- Leaked pentesting manuals given to Conti ransomware crooks☆974Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆2,971Updated 2 weeks ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,012Updated 6 months ago
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆379Updated 3 years ago
- Taking one back for Steve Irwin (๑•̀ㅂ•́)و☆993Updated 2 years ago
- ☆560Updated last year
- log4jScanner provides the ability to scan internal subnets for vulnerable log4j web services☆487Updated 2 years ago
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆418Updated 6 months ago
- CrackQ: A Python Hashcat cracking queue system☆932Updated 6 months ago
- Drone pentesting framework console☆1,515Updated 4 months ago
- A beacon generator using Cobalt Strike and a variety of tools.☆451Updated 3 years ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆881Updated 2 years ago
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,570Updated 2 months ago
- CLI tool for open source and threat intelligence☆1,200Updated last month
- Real-time HTTP Intrusion Detection☆3,047Updated last year