IVMachiavelli / NotesLinks
Technical Notes
☆16Updated 8 years ago
Alternatives and similar repositories for Notes
Users that are interested in Notes are comparing it to the libraries listed below
Sorting:
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆58Updated last year
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Updated 7 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- ☆14Updated 7 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- This is a python version of samesame repo to generate homograph strings☆24Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- ☆27Updated 7 years ago
- ☆29Updated 9 years ago
- Virustotal Data to Timesketch☆16Updated 6 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Leak File Analyzer☆62Updated 8 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- ☆52Updated 7 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- Providing timelines based on OSINT Reports☆31Updated 2 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆56Updated 3 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆46Updated 8 years ago
- Python-based SMB Share scanner -- scans a bunch of computers, outputs the path and the file permissions for the account☆43Updated 8 years ago
- HoneyDB Python Module☆14Updated last year
- Search the ExploitDB with a little more control☆22Updated 8 years ago