GranittHQ / data-pegasus-victimsView external linksLinks
This database tracks details about victims of NSO Group’s Pegasus spyware, based on reporting by Amnesty International, Citizen Lab, Forbidden Stories, and others.
☆35Nov 27, 2023Updated 2 years ago
Alternatives and similar repositories for data-pegasus-victims
Users that are interested in data-pegasus-victims are comparing it to the libraries listed below
Sorting:
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- ☆10Apr 10, 2024Updated last year
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- Five pillars of computational reproducibility☆11Feb 6, 2024Updated 2 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- A statistical framework for graph anomaly detection.☆17Sep 23, 2018Updated 7 years ago
- function identification signatures☆12Apr 26, 2021Updated 4 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- ☆23Mar 17, 2024Updated last year
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 8 months ago
- Systematic Classification Engine for Advanced Data ANalysis☆22Mar 6, 2017Updated 8 years ago
- A framework for parsing binary data.☆18Aug 12, 2022Updated 3 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 2 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆128Sep 24, 2023Updated 2 years ago
- Base45☆22Apr 30, 2024Updated last year
- ☆16Apr 30, 2024Updated last year
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Aug 18, 2019Updated 6 years ago
- A Python implementation of the Community ID flow hashing standard☆24Nov 29, 2023Updated 2 years ago
- Limier est un petit outil en CLI permettant de trouver un flux RSS quand il est planqué sur un site.☆19Aug 6, 2023Updated 2 years ago
- Library for streaming data and incremental learning algorithms.☆26Sep 17, 2025Updated 4 months ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- Example implementation of DNSAdmin DLL PrivEsc attack☆28Dec 11, 2019Updated 6 years ago
- Serverless Optimized MODules - A Serverless Framework to create reusable micro apps☆18Jul 7, 2025Updated 7 months ago
- Pure Python implementation of the XZ file format with random access support☆29Oct 18, 2025Updated 3 months ago
- Web Application for domain name monitoring / alerting☆64Aug 1, 2024Updated last year
- ☆26Jun 2, 2022Updated 3 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- CTADL is a static taint analysis tool☆51Aug 29, 2025Updated 5 months ago
- Lists of not-suitable-for-work words as YARA rules☆29Feb 2, 2026Updated last week
- A repository for data assembled by the San Francisco Chronicle for its 2024 investigation into fatal police pursuits across the U.S. Repo…☆13Feb 29, 2024Updated last year
- ☆13Aug 5, 2025Updated 6 months ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 6 years ago