AmnestyTech / investigationsLinks
Indicators of Compromise from Amnesty International's cyber investigations
☆1,633Updated 11 months ago
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,925Updated this week
- A DFIR tool written in Python.☆1,052Updated 4 years ago
- ☆1,281Updated 7 months ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆936Updated 2 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,197Updated 7 months ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆613Updated 3 years ago
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,536Updated 4 years ago
- Taking one back for Steve Irwin (๑•̀ㅂ•́)و☆1,040Updated 2 years ago
- IntelOwl: manage your Threat Intelligence at scale☆4,373Updated this week
- Indicators of stalkerware apps☆333Updated 2 months ago
- A Simple Ransomware Vaccine☆973Updated 2 years ago
- iOS Logs, Events, And Plist Parser☆991Updated last week
- 🔪 Leak git repositories from misconfigured websites☆1,586Updated this week
- Upload arbitrary data via Apple's Find My network.☆1,864Updated 2 years ago
- Tafferugli is a Twitter Analysis Framework☆361Updated 3 years ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,953Updated 2 years ago
- ☆453Updated last year
- ☆323Updated 4 years ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,075Updated 5 months ago
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,156Updated last year
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,055Updated 2 weeks ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,388Updated 9 months ago
- CrackQ: A Python Hashcat cracking queue system☆938Updated last year
- Detector for Log4Shell exploitation attempts☆730Updated 3 years ago
- ☆432Updated 3 years ago
- An open-source digital image forensic toolset☆3,056Updated 4 months ago
- VirusTotal Command Line Interface☆1,168Updated last month
- ☆524Updated last year
- Extract and Visualize Data from URLs using Unfurl☆699Updated 2 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,473Updated 3 years ago