AmnestyTech / investigationsLinks
Indicators of Compromise from Amnesty International's cyber investigations
☆1,629Updated 11 months ago
Alternatives and similar repositories for investigations
Users that are interested in investigations are comparing it to the libraries listed below
Sorting:
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆11,858Updated last week
- A DFIR tool written in Python.☆1,053Updated 4 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆935Updated 2 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,197Updated 6 months ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆615Updated 3 years ago
- ☆1,281Updated 6 months ago
- An open-source digital image forensic toolset☆3,039Updated 4 months ago
- ☆323Updated 4 years ago
- Fetch information about a public Google document.☆979Updated 2 years ago
- A central place for apes to learn about stonks. This is not financial advice.☆411Updated 4 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.☆631Updated 2 years ago
- ☆537Updated 2 years ago
- HiddenVM — Use any desktop OS without leaving a trace.☆2,578Updated last year
- Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or a more a…☆373Updated 4 years ago
- Indicators of stalkerware apps☆329Updated last month
- a file-sharing tool that allows you to find the responsible person in case of a leakage☆1,101Updated 3 years ago
- Extract and Visualize Data from URLs using Unfurl☆699Updated 2 months ago
- Pack up to 3MB of data into a tweetable PNG polyglot file.☆2,580Updated 4 years ago
- An experimentation and research platform to investigate the interaction of automated agents in an abstract simulated network environments…☆1,743Updated last month
- CLI tool for open source and threat intelligence☆1,249Updated 8 months ago
- Archiving Parler.☆228Updated 4 years ago
- A browser extension for OSINT search☆1,692Updated 3 weeks ago
- Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.☆1,245Updated last year
- ☆452Updated last year
- 💥 A collection of all documents leaked by former NSA contractor and whistleblower Edward Snowden.☆1,254Updated 5 years ago
- ☆2,664Updated last year
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,388Updated 8 months ago
- A Simple Ransomware Vaccine☆971Updated 2 years ago
- Tafferugli is a Twitter Analysis Framework☆361Updated 3 years ago
- ☆523Updated last year