CyberDataLab / disinfoxLinks
π¦ DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.
β48Updated 3 months ago
Alternatives and similar repositories for disinfox
Users that are interested in disinfox are comparing it to the libraries listed below
Sorting:
- AI-Powered Dark Web OSINT Toolβ130Updated last month
- β116Updated 5 months ago
- DFIR ORC PARSER PROJECTβ24Updated 2 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?β57Updated 3 months ago
- A tool for mapping cyber crimeβ154Updated 6 months ago
- Sniffing out well-known threat groupsβ63Updated last year
- A OSINT project that explores how to dump data from Reactβ82Updated last month
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINTβ37Updated last year
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defenseβ¦β31Updated 7 months ago
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated dβ¦β241Updated this week
- β133Updated 2 years ago
- Enrich your investigations on IPs, Domains etc. with OSINTβ52Updated last year
- A Linkedin Activity date Finderβ64Updated 6 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CKβ132Updated this week
- A short graduate course on cybercrime, cyberespionage, and cyberoperationsβ81Updated 5 months ago
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.β190Updated this week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β68Updated last year
- DPULSE - Tool for complex approach to domain OSINTβ153Updated last week
- Open Source framework for anyone to work with Perplexity Sonarβ32Updated 6 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β150Updated last year
- Tool to build and export timelinesβ36Updated last year
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the β¦β140Updated last year
- β55Updated 9 months ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)β28Updated last week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β125Updated last year
- Tor onion address lookupβ55Updated 2 months ago
- Mapping of open-source detection rules and atomic tests.β178Updated 9 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.β71Updated last month
- A collection of methods to learn who the owner of an IP address is.β174Updated last month
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.β78Updated last month