AmnestyTech / investigationsLinks
Indicators of Compromise from Amnesty International's cyber investigations
☆1,601Updated 5 months ago
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,242Updated this week
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,180Updated 3 weeks ago
- A central place for apes to learn about stonks. This is not financial advice.☆409Updated 3 years ago
- A tool for IDN homograph attacks and detection.☆737Updated 4 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆924Updated last year
- Indicators of stalkerware apps☆304Updated last month
- Open EDR public repository☆2,446Updated last year
- Canarytokens helps track activity and actions on your network.☆1,850Updated this week
- Fetch information about a public Google document.☆886Updated last year
- CLI tool for open source and threat intelligence☆1,214Updated 3 months ago
- ☆2,662Updated last year
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆372Updated 4 years ago
- A DFIR tool written in Python.☆1,049Updated 3 years ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆1,973Updated 9 months ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,894Updated 2 years ago
- A Simple Ransomware Vaccine☆964Updated last year
- CLOSE ACCESS DENIAL.☆1,492Updated this week
- CrackQ: A Python Hashcat cracking queue system☆938Updated 9 months ago
- Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.☆715Updated this week
- An open-source digital image forensic toolset☆2,929Updated 3 weeks ago
- Detector for Log4Shell exploitation attempts☆731Updated 3 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,211Updated 4 months ago
- SpyGuard is a forked and enhanced version of TinyCheck. SpyGuard's main objective is to detect signs of compromise by monitoring network …☆428Updated 8 months ago
- An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments…☆1,707Updated last month
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,008Updated 2 weeks ago
- ☆86Updated 4 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,270Updated 2 years ago
- ☆514Updated last year
- Loki - Simple IOC and YARA Scanner☆3,552Updated 6 months ago
- This repository contains a list of popular CNAME trackers☆398Updated this week