Knowledge base on cybercriminal concealment techniques
☆229Mar 14, 2026Updated this week
Alternatives and similar repositories for CLOAK
Users that are interested in CLOAK are comparing it to the libraries listed below
Sorting:
- Python implementation of the CaRT library for (un)inerting files.☆52Feb 10, 2025Updated last year
- the repo for cmtracker☆22Oct 8, 2018Updated 7 years ago
- High fidelity JA3 & JA3S combinations for known botnets and alike☆12Feb 14, 2019Updated 7 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 4 months ago
- config files for i3wm☆16Nov 11, 2017Updated 8 years ago
- A modular, skill-based autonomous Security Operations Center (SOC) agent that monitors OpenSearch/Elasticsearch data, builds RAG-based be…☆136Updated this week
- Social Engineering Tactics contains real-world social engineering tactics used for manipulation, persuasion, and deception. Stay aware an…☆46Jan 25, 2026Updated last month
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆70Jun 5, 2025Updated 9 months ago
- Extract Procedural Details of the TTP based on the actor mentioned in OSINT reportings☆13Feb 25, 2024Updated 2 years ago
- Simple web app for displaying cowrie data in your browser☆12Jun 2, 2016Updated 9 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆49Jul 8, 2025Updated 8 months ago
- A high-performance TUI-based packet crafting tool written in Rust.☆32Dec 25, 2025Updated 2 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 8 months ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆21Nov 29, 2024Updated last year
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- AI-Powered Threat Intelligence MCP tool☆33Jul 18, 2025Updated 8 months ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆66May 24, 2020Updated 5 years ago
- ☆22Jan 31, 2023Updated 3 years ago
- Velociraptor Server hosted in Azure App Service☆59Jun 4, 2025Updated 9 months ago
- Repo to hold mcp server for velociraptor☆32Jul 27, 2025Updated 7 months ago
- ☆21Jan 28, 2026Updated last month
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloud☆45Dec 7, 2025Updated 3 months ago
- Anti-Honeypot Demo (obsolete)☆18Jul 24, 2017Updated 8 years ago
- Extension Osint Sync☆48Nov 26, 2025Updated 3 months ago
- Active Directory share enumeration tool☆12Apr 28, 2025Updated 10 months ago
- An Adaptive Misuse Detection System☆46Nov 4, 2024Updated last year
- ☆24Feb 18, 2025Updated last year
- Frequently asked questions about augmentation, biohacking, grinding, implants, and related topics.☆10Nov 26, 2024Updated last year
- ☆102Apr 4, 2025Updated 11 months ago
- A resource containing all the tools each ransomware gangs uses☆1,329Updated this week
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Dec 8, 2019Updated 6 years ago
- Automatically block IPs with failed SSH logins using pf(4)☆16Aug 21, 2015Updated 10 years ago
- This repo includes the artifacts for the USENIX Security 2025 paper "Exposing and Circumventing SNI-based QUIC Censorship of the Great Fi…☆33Aug 5, 2025Updated 7 months ago