IVMachiavelli / NotesLinks
Technical Notes
☆16Updated 7 years ago
Alternatives and similar repositories for Notes
Users that are interested in Notes are comparing it to the libraries listed below
Sorting:
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year
- Flash crossdomain policy security checker☆26Updated 10 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- ☆15Updated 7 years ago
- ☆27Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- HoneyDB Python Module☆14Updated last year
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- ☆29Updated 9 years ago
- A scoreboard for Security CTF events☆37Updated 12 years ago
- ☆18Updated 7 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago