AmnestyTech / investigations
Indicators of Compromise from Amnesty International's cyber investigations
☆1,582Updated 2 months ago
Alternatives and similar repositories for investigations:
Users that are interested in investigations are comparing it to the libraries listed below
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆10,718Updated this week
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,166Updated last month
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆919Updated last year
- A central place for apes to learn about stonks. This is not financial advice.☆411Updated 3 years ago
- A DFIR tool written in Python.☆1,045Updated 3 years ago
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 3 years ago
- A Simple Ransomware Vaccine☆953Updated last year
- 📱 Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-de…☆1,380Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,086Updated 3 weeks ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,320Updated last year
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,037Updated last month
- Bash script to check if a domain or list of domains can be spoofed based in DMARC records☆322Updated 2 years ago
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,051Updated 3 years ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆605Updated 2 years ago
- A list of free and open forensics analysis tools and other resources☆1,174Updated 2 months ago
- Taking one back for Steve Irwin (๑•̀ㅂ•́)و☆980Updated 2 years ago
- An open-source digital image forensic toolset☆2,750Updated 3 months ago
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,739Updated last year
- Cybersecurity Evaluation Tool☆1,500Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,432Updated 6 months ago
- Indicators of stalkerware apps☆280Updated last month
- A community sourced list of log4j-affected software☆1,119Updated 2 years ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆951Updated 2 months ago
- Tinfoil Chat - Onion-routed, endpoint secure messaging system☆1,246Updated this week
- Fetch information about a public Google document.☆867Updated last year
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆941Updated last year
- A query aggregator for OSINT based threat hunting☆877Updated last week
- Hardentools simply reduces the attack surface on Microsoft Windows computers by disabling low-hanging fruit risky features.☆2,947Updated 10 months ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆756Updated 6 months ago
- Canarytokens helps track activity and actions on your network.☆1,798Updated this week