Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!
☆64Oct 17, 2025Updated 4 months ago
Alternatives and similar repositories for OperationArchive
Users that are interested in OperationArchive are comparing it to the libraries listed below
Sorting:
- A web scrape of Darknetlive. Incognito Market admin has removed the news page. This scrape has everything including the news.☆31Dec 17, 2024Updated last year
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆51Jun 19, 2025Updated 8 months ago
- Cannahome source code and database☆11Feb 22, 2023Updated 3 years ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆452May 23, 2025Updated 9 months ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Sep 4, 2024Updated last year
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- ToolShell scanner - CVE-2025-53770 and detection information☆18Dec 7, 2025Updated 2 months ago
- ☆14Updated this week
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 6 months ago
- insta-onion: Create a Tor Onion service in 20 seconds☆14Apr 12, 2020Updated 5 years ago
- ☆30Dec 19, 2024Updated last year
- A python script to check printer across the world that allow printing on port 9100 trough pjl☆14Dec 27, 2024Updated last year
- osint tool for dumping links containing trackers from each user on one or all discords☆72May 12, 2025Updated 9 months ago
- Checks the OVH API to see if an IP address is in forced mitigation mode and sends Discord alerts.☆12Oct 18, 2021Updated 4 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- ☆20May 1, 2024Updated last year
- DarkStar is a Premium Hacking Tools. You can buy by contacting me☆26Oct 27, 2024Updated last year
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 3 months ago
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆30Feb 12, 2026Updated 2 weeks ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 2 years ago
- Example for implementing a loading screen for flask.☆19Feb 15, 2021Updated 5 years ago
- Single animated HTML file that teaches the workings of the TCP Handshake.☆28Mar 10, 2025Updated 11 months ago
- Build your personal docker-compose.yml file for Monero services.☆59Updated this week
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Sep 22, 2023Updated 2 years ago
- automated Open Source Intelligence gathering☆187Nov 23, 2025Updated 3 months ago
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25May 5, 2022Updated 3 years ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆75Dec 10, 2025Updated 2 months ago
- DeepFace UI is a web application for facial recognition and analysis built with DeepFace. It offers an intuitive interface to upload imag…☆139Mar 27, 2025Updated 11 months ago
- Curated list of ransomware-related resources; awesome style.☆32Jan 17, 2025Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30May 7, 2024Updated last year
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆71Apr 25, 2025Updated 10 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Dec 27, 2023Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 9 months ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 3 months ago
- DareDevil is a Cloner Tool. That Help You to Clone Different Varieties of Latest, Updated, Working Tools In One Click..☆10Nov 25, 2022Updated 3 years ago
- Manage user's subscriptions based on invitation.☆12Sep 25, 2023Updated 2 years ago
- Discover and monitor internet assets using favicon hashes across search engines.☆226Oct 11, 2025Updated 4 months ago
- YuriCable Pro Max (SWD/DCSD-Cable App implemented for the Flipper Zero) Currently DCSD Support☆37Aug 29, 2025Updated 6 months ago