Dutchosintguy / OSINT-workshop-sansLinks
Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020
☆29Updated 5 years ago
Alternatives and similar repositories for OSINT-workshop-sans
Users that are interested in OSINT-workshop-sans are comparing it to the libraries listed below
Sorting:
- Admin for☆17Updated 7 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- ☆39Updated 4 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 8 months ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- ☆21Updated 2 years ago
- Submits multiple domains to VirusTotal API☆59Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 3 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆60Updated 4 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated this week
- OSINT VM based on Open Source Intelligence Techniques 7th Edition☆67Updated 5 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆94Updated 4 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 5 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- an awesome list of active defense resources☆126Updated 5 years ago
- ☆14Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Wrap any binary into a cached webserver☆55Updated 3 years ago
- ☆30Updated 6 years ago
- Use the Hacker Target IP Tools API for Reconnaissance in Maltego☆68Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago