☆146Mar 26, 2024Updated 2 years ago
Alternatives and similar repositories for Dark-Web-Archives
Users that are interested in Dark-Web-Archives are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆31Dec 19, 2024Updated last year
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 7 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆162Updated this week
- Fraud prevention tool☆28Aug 9, 2020Updated 5 years ago
- My mobile writeups repository☆29Nov 19, 2025Updated 4 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆51Feb 21, 2025Updated last year
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks including stealer logs, credential dumps…☆49Feb 19, 2026Updated last month
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆107Jul 31, 2023Updated 2 years ago
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated 2 months ago
- ☆14Jun 26, 2020Updated 5 years ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆126Jan 27, 2025Updated last year
- Living of the Land of Free SaaS☆69Mar 22, 2026Updated 2 weeks ago
- ☆57Nov 18, 2025Updated 4 months ago
- Odinova Digital Tiger is an advanced application designed for Open-Source Intelligence (OSINT), equipped with versatile tools and a user-…☆87Feb 5, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Sample code for exfiltrating data through an XSS vulnerability. XSS Payload retrieves sensitive data in victim's browser, then breaks it …☆21May 11, 2021Updated 4 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- By simply inputting text or public network links with details of vulnerability Payloads, Goby AI 2.0 can intelligently output PoC/EXP, si…☆14Feb 20, 2025Updated last year
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated 3 weeks ago
- A resource containing all the tools each ransomware gangs uses☆1,343Apr 1, 2026Updated last week
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆30Mar 18, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Live Feed of C2 servers, tools, and botnets☆766Updated this week
- Generate random test credit card numbers for testing, validation and/or verification purposes.☆12Nov 28, 2021Updated 4 years ago
- eml metadata parser.☆17Jan 24, 2023Updated 3 years ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆234Apr 18, 2025Updated 11 months ago
- A Ip Pinger / Analyzer A Credit Card Gen A Email Gen + Checker And MORE!☆11Jun 2, 2022Updated 3 years ago
- ☆19Jan 23, 2020Updated 6 years ago
- Example for implementing a loading screen for flask.☆19Feb 15, 2021Updated 5 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Aug 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Stealthy .NET assembly loading using AssemblyNative::LoadFromBuffer☆52Mar 22, 2026Updated 2 weeks ago
- ☆32Apr 2, 2026Updated last week
- ProtOSINT is a Python script that helps you investigate Protonmail accounts and ProtonVPN IP addresses☆13Sep 2, 2022Updated 3 years ago
- Advanced wireless penetration testing tools☆20Jan 19, 2022Updated 4 years ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,097Mar 3, 2026Updated last month
- A collection of methods to learn who the owner of an IP address is.☆229Sep 29, 2025Updated 6 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆60Sep 18, 2025Updated 6 months ago