A resource full of Crypto/OSINT tools, techniques and training courses for CTI, AML, and forensic investigations.
☆125Mar 2, 2026Updated last month
Alternatives and similar repositories for Legendary_Crypto
Users that are interested in Legendary_Crypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated 11 months ago
- BlackMail is a tool for creating and sending spoof mail.☆37Nov 16, 2023Updated 2 years ago
- BloodRecon — 🧠 Master the art of digital hunting with 34+ OSINT modules.☆20Jul 31, 2025Updated 8 months ago
- A OSINT project that explores how to dump data from React☆82Sep 16, 2025Updated 6 months ago
- Chrome Extensions for OSINT☆188Mar 6, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 4 months ago
- A robust Python-based OSINT tool designed for validating and investigating email addresses across social media platforms and known data b…☆63Aug 6, 2025Updated 8 months ago
- 免杀木马样本☆106Oct 11, 2025Updated 6 months ago
- SMSBOX is a tool to send anonymous messages. This script uses the Textbelt API to work, Textbelt is an API that allows us to send a singl…☆18Jul 1, 2025Updated 9 months ago
- Camera phishing screen (to take photos from the front and rear cameras)☆71Nov 20, 2025Updated 4 months ago
- reveal origins behind reverse proxies & hidden services☆37Aug 23, 2025Updated 7 months ago
- EmailCrawl - is a professional-grade OSINT (Open Source Intelligence) tool designed for advanced email address extraction through compreh…☆160Jan 26, 2026Updated 2 months ago
- Learn how to conduct advanced searching of the World Wide Web☆302Jul 15, 2025Updated 9 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆216Mar 7, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- a common schema for internet-connected service discovery☆23Mar 24, 2026Updated 3 weeks ago
- The Binary Code Recognition Library for game hacking/modding and function reidentification for linux☆13Jan 25, 2026Updated 2 months ago
- OSINT resources and tools by country, structured for fact-checkers and digital profilers☆141Sep 10, 2025Updated 7 months ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 10 months ago
- This toolkit useful in profiling, research and digital investigations built for me and my trainees. Working and necessary tools only. All…☆42Nov 22, 2025Updated 4 months ago
- OSINT Tools for the Dark Web☆251Mar 26, 2025Updated last year
- ☆28Jan 31, 2024Updated 2 years ago
- Custom Search Engines for OSINT☆143Mar 20, 2026Updated 3 weeks ago
- WiFisploit is a tool designed to scan and attack Wi-Fi networks using variety of powerful and effective attacks. It contains numerous com…☆42Jun 16, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A list of sources for OSINT in Uzbekistan☆23Jan 17, 2025Updated last year
- A tool for extracting additional data from a person's personal identifiers☆42Nov 14, 2023Updated 2 years ago
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 26, 2026Updated 2 weeks ago
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Jan 12, 2025Updated last year
- GDorks Web is a Flask-based web application that allows users to browse and retrieve random Google Dorks from the GDorks repository on Gi…☆12Jul 24, 2025Updated 8 months ago
- New 2026 Darkweb Private-Unleashed 2.0 Firmware for Car Hacking and Rolling Code Bypassing☆43Jan 15, 2026Updated 2 months ago
- A diverse collection of privacy, security, and FOSS resources in English and Arabic, encompassing tools, extensions, operating systems, e…☆37Jun 12, 2025Updated 10 months ago
- computer software application to flash bootloader and read ECUs status☆14Jul 3, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- BurpSiute - BurpBounty Profiles☆20Feb 10, 2023Updated 3 years ago
- ☆12May 16, 2025Updated 10 months ago
- 🚀 ORedirectMe is a robust and efficient tool designed to detect Open Redirect vulnerabilities in web applications.☆17Mar 24, 2026Updated 3 weeks ago
- Here you find the complete list of enrichments and extractionsfor Ubikron.☆35Mar 6, 2026Updated last month
- TUI bash history for Linux in C (CLI)☆15Dec 1, 2024Updated last year
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated last year
- Repository for write-ups of Sofia Santos' OSINT exercises☆18Sep 29, 2025Updated 6 months ago