This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-source intelligence (OSINT) tools and blockchain forensics, we trace Bitcoin transactions, identify hidden connections between onion sites, and track funds to cryptocurrency exchanges like Binance.
☆33Apr 14, 2025Updated 11 months ago
Alternatives and similar repositories for TracingDarkWebAndBlockChain
Users that are interested in TracingDarkWebAndBlockChain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆46Jun 1, 2025Updated 9 months ago
- A curated collection of tools, bots, and resources for Open Source Intelligence (OSINT) investigations on Telegram. Includes chat analysi…☆58Oct 5, 2025Updated 5 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆14Jun 3, 2025Updated 9 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 免杀木马样本☆105Oct 11, 2025Updated 5 months ago
- Some useful books related to Cybersecurity, Linux and more.☆79Feb 27, 2026Updated 3 weeks ago
- A FREE comprehensive reverse engineering course covering x86, x64, 32-bit ARM & 64-bit ARM architectures.☆15Sep 19, 2023Updated 2 years ago
- Automated Google Dorking Tool. Generates and runs advanced search queries to surface exposed files, admin panels, open directories, login…☆83Updated this week
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 4 months ago
- python keylogger and spying malware .☆15Apr 24, 2025Updated 11 months ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 11 months ago
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 11 months ago
- ☆13Dec 21, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A well organised book on 'Python Programming Language' written in bengali specially for beginners and intermediate learners.☆12Jun 28, 2021Updated 4 years ago
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆76Oct 2, 2025Updated 5 months ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆32Sep 15, 2024Updated last year
- A framework for identifying vulnerabilities in VS Code extensions☆19Jul 9, 2024Updated last year
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Axinom DRM Sample Player with offline playback support☆15Sep 4, 2023Updated 2 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- Shellcode loader written in C and Assembly utilizing direct or indirect syscalls to evade UM EDR hooks☆139Dec 22, 2024Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Aug 19, 2024Updated last year
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- command control framework☆33Mar 19, 2026Updated last week
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- DarkGPT is an OSINT assistant based on GPT-4-200K (recommended use) designed to perform queries on leaked databases, thus providing an ar…☆175Mar 12, 2024Updated 2 years ago
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆91Jan 25, 2026Updated 2 months ago
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 10 months ago
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- 第四届 “网鼎杯” 网络安全大赛 白虎组 初赛☆16Nov 1, 2024Updated last year
- C++ Staged Shellcode Loader with Evasion capabilities.☆96Oct 7, 2024Updated last year