☆149Mar 26, 2024Updated 2 years ago
Alternatives and similar repositories for Dark-Web-Archives
Users that are interested in Dark-Web-Archives are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆31Dec 19, 2024Updated last year
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 8 months ago
- Lockbit, URSIF, BlackBasta etc.☆227Oct 23, 2025Updated 6 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆163Updated this week
- Fraud prevention tool☆28Aug 9, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Capture screenshots of onion services on an onion service.☆72Jun 11, 2024Updated last year
- My mobile writeups repository☆30Nov 19, 2025Updated 5 months ago
- ☆53Feb 21, 2025Updated last year
- Leaky is a powerful toolkit designed to import, manage, search, and visualize massive data leaks including stealer logs, credential dumps…☆48Feb 19, 2026Updated 2 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Jul 5, 2023Updated 2 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆107Jul 31, 2023Updated 2 years ago
- my reading list for reverse engineering malware & exploit development☆16Feb 3, 2026Updated 2 months ago
- ☆24Apr 24, 2026Updated last week
- ☆14Jun 26, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Tool designed to exfiltrate OneDrive Business OCR Data☆127Jan 27, 2025Updated last year
- ☆57Nov 18, 2025Updated 5 months ago
- Sample code for exfiltrating data through an XSS vulnerability. XSS Payload retrieves sensitive data in victim's browser, then breaks it …☆21May 11, 2021Updated 4 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.☆119Aug 30, 2023Updated 2 years ago
- Odinova Digital Tiger is an advanced application designed for Open-Source Intelligence (OSINT), equipped with versatile tools and a user-…☆89Feb 5, 2026Updated 2 months ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- ☆13Aug 14, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Telegram bot to scrape credit card numbers, stripe secret keys from telegram chats.☆14Sep 24, 2023Updated 2 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- Backdooring Claude Code via hooks in settings.json. Authorized use only!☆65Apr 16, 2026Updated 2 weeks ago
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆31Mar 18, 2025Updated last year
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Live Feed of C2 servers, tools, and botnets☆771Apr 13, 2026Updated 2 weeks ago
- Generate random test credit card numbers for testing, validation and/or verification purposes.☆12Nov 28, 2021Updated 4 years ago
- eml metadata parser.☆17Jan 24, 2023Updated 3 years ago
- Tool for searching information via Telegram, Number Phone and Username.☆35Apr 30, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆236Apr 18, 2025Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆118Oct 29, 2024Updated last year
- A Ip Pinger / Analyzer A Credit Card Gen A Email Gen + Checker And MORE!☆11Jun 2, 2022Updated 3 years ago
- What if you could give your wallpapers, a little touch? On the fly, of course☆11Feb 25, 2024Updated 2 years ago
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 4 months ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Example for implementing a loading screen for flask.☆19Feb 15, 2021Updated 5 years ago