IVMachiavelli / NotesLinks
Technical Notes
☆16Updated 7 years ago
Alternatives and similar repositories for Notes
Users that are interested in Notes are comparing it to the libraries listed below
Sorting:
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 8 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 4 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆20Updated 8 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- ☆26Updated 5 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Updated 8 years ago
- HoneyDB Python Module☆13Updated last year
- Crawl certificate information from censys☆8Updated 8 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- patched information leak leaking full names associated with some email addresses including but not limited to gmail☆36Updated 4 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆18Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago