It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb
☆37Apr 12, 2024Updated last year
Alternatives and similar repositories for Dark_OSINT_AI
Users that are interested in Dark_OSINT_AI are comparing it to the libraries listed below
Sorting:
- ☆10Mar 11, 2024Updated last year
- This is a collection of everything I have and am learning about OSINT. Feel free to send pull requests adding more stuff! I want to learn…☆12Jan 2, 2024Updated 2 years ago
- A comprehensive OSINT (Open Source Intelligence) script that gathers detailed information about a target domain using various public sour…☆18May 19, 2024Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Run Python on the Flipper Zero☆16Mar 28, 2024Updated last year
- youtube dork queries for default file names☆14Nov 3, 2021Updated 4 years ago
- Social Media Search Tool☆15Aug 25, 2024Updated last year
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year
- A collection of tools for hackers, pentesters & security researchers.☆18Mar 22, 2022Updated 3 years ago
- A collection of BadUSB scripts for the PwnPi & PwnPi A.L.O.A.☆14Nov 14, 2024Updated last year
- OSCP Cheatsheet☆16Jun 14, 2023Updated 2 years ago
- Find tools that will help you with your OSINT investigations, from auditing, screen recording to aggregation. Add then to your OSINT Tool…☆50Jan 4, 2026Updated 2 months ago
- Tools for Attacking Pleasant Password Server☆22Sep 19, 2023Updated 2 years ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Aug 21, 2023Updated 2 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- A swiss army knife for pentesting networks☆24Mar 16, 2023Updated 2 years ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Dec 2, 2024Updated last year
- Learn the most common Threats in mobile technology, Learn how to build your own IMSI catcher, and more!☆20May 30, 2025Updated 9 months ago
- Script related in Active Directory Attacks Domain☆24Aug 19, 2023Updated 2 years ago
- Apple BLE proximity pairing message spoofing☆19Aug 29, 2023Updated 2 years ago
- ☆26Jun 5, 2024Updated last year
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- A tool designed for penetration testers to perform attacks on LAN and WLAN networks, including network discovery, exploitation, and NAC b…☆44Jul 31, 2025Updated 7 months ago
- ☆31Sep 23, 2022Updated 3 years ago
- Toolkit for creating cryptographic figures and videos.☆35May 17, 2024Updated last year
- ☆65Jun 5, 2021Updated 4 years ago
- This repository is a comprehensive collection of tools, resources, and websites for Open-Source Intelligence (OSINT). This repository is …☆60Nov 30, 2024Updated last year
- damn-exploitable-android-app-apk☆40Jun 9, 2023Updated 2 years ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆35Apr 14, 2024Updated last year
- Browser streaming MITM proxy☆30Sep 5, 2023Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- Allows invisible Payloads to be decoded and encoded.☆28Mar 5, 2024Updated 2 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago
- ☆37Feb 12, 2018Updated 8 years ago
- Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing☆32Jun 6, 2024Updated last year
- Search tools to help you find people, focused towards UK resources.☆134May 17, 2025Updated 9 months ago