M82-project / Dictionnaire_Cyber
Projet de dictionnaire Cybersécurité et réseaux
☆28Updated last month
Alternatives and similar repositories for Dictionnaire_Cyber:
Users that are interested in Dictionnaire_Cyber are comparing it to the libraries listed below
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆28Updated last month
- Intelligence DNS Blocklist : Phishing, Scam, Malicious DN, Malware Delivery☆29Updated this week
- Command Line Sock Puppet Creator for Investigators.☆73Updated last month
- Speed up your pentest enumeration☆83Updated last month
- Maltego transforms for investigative journalism☆81Updated last year
- HookPhish is a Python script designed to aid in the detection of phishing websites☆35Updated last year
- ☆108Updated 4 months ago
- bibliographie cyber publique du M82_project☆18Updated 2 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Updated 6 months ago
- Bruteforce DPAPI encrypted MasterKey File from Windows Credentials Manager☆19Updated 3 months ago
- DPULSE - Tool for complex approach to domain OSINT☆110Updated last week
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆127Updated last month
- ☆53Updated 3 months ago
- GLPI vulnerabilities checking tool☆106Updated last week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆148Updated 2 months ago
- DFIR ORC PARSER PROJECT☆25Updated 2 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperations☆78Updated 6 months ago
- All-sources tool to search websites by favicons☆122Updated 5 months ago
- Documentation for Exegol☆60Updated this week
- ☆93Updated 3 weeks ago
- ☆21Updated last year
- Discovering Typo Squatting on your domains!☆68Updated 8 months ago
- ☆17Updated 2 years ago
- AI-Powered Dark Web OSINT Tool☆36Updated this week
- Discover and monitor internet assets using favicon hashes across search engines.☆167Updated 3 months ago
- Cybersecurity's lighter side: a collection of the most amusing misunderstandings and missteps from newcomers to offensive security tools.…☆57Updated last year
- A Linkedin Activity date Finder☆44Updated 2 weeks ago
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆41Updated 2 months ago
- Dredging up secrets from the depths of the file system☆125Updated 5 months ago
- ☆55Updated 11 months ago