CyberSecurityUP / HermitPurple-MaltegoceLinks
Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support
☆34Updated last year
Alternatives and similar repositories for HermitPurple-Maltegoce
Users that are interested in HermitPurple-Maltegoce are comparing it to the libraries listed below
Sorting:
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆82Updated 2 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 4 months ago
- ☆35Updated 4 months ago
- ☆40Updated 7 months ago
- Capture screenshots of onion services on an onion service.☆69Updated last year
- 🕵️ Email osint tool☆62Updated last year
- Challenge Python☆19Updated 2 years ago
- Discovering Typo Squatting on your domains!☆71Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆51Updated 3 weeks ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆64Updated last month
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- ☆28Updated 10 months ago
- Script related in Active Directory Attacks Domain☆22Updated last year
- ☆55Updated last year
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆15Updated 7 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆43Updated last week
- ☆64Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆121Updated last year
- Powershell tools used for Red Team / Pentesting.☆78Updated last year
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆50Updated 3 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- A collection of tools that I use in CTF's or for assessments☆102Updated 6 months ago
- ☆54Updated 6 months ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆19Updated last month
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- ☆76Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated 6 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year