AmnestyTech / investigations
Indicators of Compromise from Amnesty International's cyber investigations
☆1,581Updated 2 months ago
Alternatives and similar repositories for investigations:
Users that are interested in investigations are comparing it to the libraries listed below
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆10,771Updated 3 weeks ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆921Updated last year
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,916Updated 2 years ago
- ☆1,262Updated last month
- A DFIR tool written in Python.☆1,046Updated 3 years ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,074Updated this week
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,897Updated 2 years ago
- A community sourced list of log4j-affected software☆1,120Updated 2 years ago
- PoC tool to coerce Windows hosts to authenticate to other machines via MS-EFSRPC EfsRpcOpenFileRaw or other functions.☆1,919Updated 7 months ago
- Indicators of stalkerware apps☆289Updated last week
- Upload arbitrary data via Apple's Find My network.☆1,824Updated last year
- VirusTotal Command Line Interface☆885Updated 7 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,065Updated 2 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆2,956Updated this week
- A Simple Ransomware Vaccine☆957Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆2,974Updated 2 weeks ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,169Updated 3 weeks ago
- A beacon generator using Cobalt Strike and a variety of tools.☆450Updated 3 years ago
- An open-source digital image forensic toolset☆2,764Updated 4 months ago
- CLI tool for open source and threat intelligence☆1,196Updated 2 weeks ago
- Passive hostname, domain and IP lookup tool for non-robots☆899Updated 4 months ago
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,009Updated 5 months ago
- Taking one back for Steve Irwin (๑•̀ㅂ•́)و☆985Updated 2 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,701Updated last year
- a recon tool that allows searching on URLs that are exposed via shortener services☆1,566Updated last month
- Gives you instant SYSTEM command prompt on all supported and legacy versions of Windows☆379Updated 3 years ago
- KeyDecoder app lets you use your smartphone or tablet to decode your mechanical keys in seconds.☆3,109Updated last year
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆610Updated 2 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,531Updated last week
- Tafferugli is a Twitter Analysis Framework☆361Updated 2 years ago