AmnestyTech / investigationsLinks
Indicators of Compromise from Amnesty International's cyber investigations
☆1,636Updated last year
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,977Updated last week
- ☆1,283Updated 8 months ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,201Updated 7 months ago
- A DFIR tool written in Python.☆1,052Updated 4 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆938Updated 2 years ago
- ☆323Updated 4 years ago
- An open-source digital image forensic toolset☆3,066Updated 5 months ago
- Technical notes from investigations into COVID-19 contact-tracing apps☆50Updated 5 years ago
- Convert Apple NeuralHash model for CSAM Detection to ONNX.☆1,535Updated 4 years ago
- A Simple Ransomware Vaccine☆975Updated 2 years ago
- Indicators of stalkerware apps☆335Updated 2 months ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆615Updated 3 years ago
- Trojan Source: Invisible Vulnerabilities☆1,272Updated 2 years ago
- Detector for Log4Shell exploitation attempts☆729Updated 3 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.☆627Updated 2 years ago
- VirusTotal Command Line Interface☆1,195Updated 2 months ago
- ☆1,151Updated 4 months ago
- Fetch information about a public Google document.☆983Updated 2 years ago
- ☆452Updated last year
- A tool for IDN homograph attacks and detection.☆741Updated 4 years ago
- Protect yourself from being tracked 🌍 by AirTags 🏷 and Find My accessories 📍☆2,195Updated last week
- Upload arbitrary data via Apple's Find My network.☆1,866Updated 2 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,300Updated 2 years ago
- A community sourced list of log4j-affected software☆1,124Updated 3 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,393Updated 9 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,955Updated 2 years ago
- ☆373Updated 4 months ago
- ☆562Updated 2 years ago
- Tafferugli is a Twitter Analysis Framework☆361Updated 3 years ago
- CrackQ: A Python Hashcat cracking queue system☆939Updated last year