A resource full of Crypto/OSINT tools, techniques and training courses for CTI, AML, and forensic investigations.
☆128Mar 2, 2026Updated 2 months ago
Alternatives and similar repositories for Legendary_Crypto
Users that are interested in Legendary_Crypto are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆36May 1, 2025Updated last year
- BlackMail is a tool for creating and sending spoof mail.☆37Nov 16, 2023Updated 2 years ago
- BloodRecon — 🧠 Master the art of digital hunting with 34+ OSINT modules.☆20Jul 31, 2025Updated 9 months ago
- CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.☆37Sep 14, 2025Updated 7 months ago
- Chrome Extensions for OSINT☆189Mar 6, 2026Updated last month
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- لیست انواع دی ان اس☆29Updated this week
- C programs for sockets, reverse shell, shellcode execution, and process injection.☆25Dec 10, 2025Updated 4 months ago
- A robust Python-based OSINT tool designed for validating and investigating email addresses across social media platforms and known data b…☆63Aug 6, 2025Updated 8 months ago
- SMSBOX is a tool to send anonymous messages. This script uses the Textbelt API to work, Textbelt is an API that allows us to send a singl…☆18Jul 1, 2025Updated 10 months ago
- H0tmCheck: email checking sin ruido, sin basura, solo resultados.☆18Dec 14, 2025Updated 4 months ago
- reveal origins behind reverse proxies & hidden services☆37Aug 23, 2025Updated 8 months ago
- EmailCrawl - is a professional-grade OSINT (Open Source Intelligence) tool designed for advanced email address extraction through compreh…☆164Jan 26, 2026Updated 3 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆219Mar 7, 2026Updated last month
- a common schema for internet-connected service discovery☆23Mar 24, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 11 months ago
- This toolkit useful in profiling, research and digital investigations built for me and my trainees. Working and necessary tools only. All…☆42Nov 22, 2025Updated 5 months ago
- OSINT Tools for the Dark Web☆250Mar 26, 2025Updated last year
- ☆30Jan 31, 2024Updated 2 years ago
- WiFisploit is a tool designed to scan and attack Wi-Fi networks using variety of powerful and effective attacks. It contains numerous com…☆42Jun 16, 2025Updated 10 months ago
- A list of sources for OSINT in Uzbekistan☆23Jan 17, 2025Updated last year
- This project crawls v2ray configs from Telegram channels.☆50Updated this week
- Telegrip is a digital forensic tool that provides acquistion and analysis for Telegram-related cases.☆19May 11, 2022Updated 3 years ago
- A tool for extracting additional data from a person's personal identifiers☆42Nov 14, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 26, 2026Updated last month
- A simple browser extension to quickly find interesting security-related information on a webpage.☆177Mar 26, 2026Updated last month
- A diverse collection of privacy, security, and FOSS resources in English and Arabic, encompassing tools, extensions, operating systems, e…☆37Jun 12, 2025Updated 10 months ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆83Jun 11, 2025Updated 10 months ago
- ☆12May 16, 2025Updated 11 months ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆13Apr 15, 2024Updated 2 years ago
- Here you find the complete list of enrichments and extractionsfor Ubikron.☆37Mar 6, 2026Updated last month
- Repository for write-ups of Sofia Santos' OSINT exercises☆18Sep 29, 2025Updated 7 months ago
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆95Jul 15, 2025Updated 9 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆18Jan 24, 2024Updated 2 years ago
- Rust library implementing the Toorani-Beheshti signcryption scheme☆13Aug 15, 2023Updated 2 years ago
- AI Powered Sensitive Information Detection☆20Mar 13, 2024Updated 2 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆58Dec 29, 2024Updated last year
- AWS Access Review is a comprehensive, zero-configuration security assessment tool that automatically evaluates your AWS environment for p…☆24Apr 18, 2026Updated 2 weeks ago
- آموزش راهاندازی فیلتر شکن شخصی☆24Mar 18, 2023Updated 3 years ago
- Keylogger for ethical hackers☆14Aug 25, 2021Updated 4 years ago