Detailed OSINT guide for future engagements.
☆17Jan 15, 2023Updated 3 years ago
Alternatives and similar repositories for OSINT-full-guide
Users that are interested in OSINT-full-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Jan 28, 2024Updated 2 years ago
- Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PE…☆11May 19, 2020Updated 5 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Nov 21, 2020Updated 5 years ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆23Jul 11, 2021Updated 4 years ago
- Free and Open-Source Chatbot Platform powered by .NET Core 3.0 and Blazor!☆14Nov 21, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆16Dec 16, 2021Updated 4 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Repository for hosting the MITRE Cyber Academy website.☆11Apr 12, 2023Updated 3 years ago
- ☆11Sep 22, 2025Updated 7 months ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Unifi Images☆27Apr 4, 2025Updated last year
- A curated list of awesome threat detection and hunting resources☆16Sep 12, 2018Updated 7 years ago
- A curated list of FOSS software appliances for building a SOC☆18Jan 11, 2021Updated 5 years ago
- Pongs is a simple game where you can move your paddle using the WASD and arrow keys to hit the ball to the other side. If the ball goes p…☆14Jun 2, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Network Privacy and Security Tool- Change MAC addresses, randomizing internal IP addresses, and renewing IP addresses☆43Dec 1, 2025Updated 5 months ago
- Simple script to test WAFs☆14Feb 10, 2017Updated 9 years ago
- Easily scan for CVEs using nmap.☆16Jan 13, 2022Updated 4 years ago
- A repo for the code for the course "JavaScript Shopping Cart"☆13Jun 9, 2020Updated 5 years ago
- Random Tools☆19Jan 23, 2019Updated 7 years ago
- Mishky's AD Range & The Escalation Path from Hell, version 1.1☆20Feb 5, 2026Updated 3 months ago
- A GUI for MSF Venom that serves the generated payload for you, in addition to launching a listener using the provided port.☆22Jul 26, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆16Jan 8, 2019Updated 7 years ago
- This OTP Bot is capable of fetching you an OTP code sent to any phone number for 2FA/MFA verification.☆59Aug 1, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- AIHTTPAnalyzer revolutionizes web application security testing by bringing artificial intelligence capabilities to Burp Suite. This innov…☆27Mar 12, 2025Updated last year
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Jul 23, 2019Updated 6 years ago
- Azur3Alph4 is a PowerShell module that automates red-team tasks for ops on objective. This module situates in a post-breach (RCE achieved…☆63Aug 11, 2021Updated 4 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Jun 22, 2022Updated 3 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆63Jul 3, 2021Updated 4 years ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Dec 1, 2022Updated 3 years ago
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆42Jun 10, 2025Updated 10 months ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆40Jul 21, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- ☆50Apr 28, 2025Updated last year
- A curated list of Docker resources☆28Nov 13, 2015Updated 10 years ago
- A curated list featuring OSs, hacking, cybersecurity, network security, and IT-related subreddits.☆32Apr 18, 2026Updated 2 weeks ago
- A little cheatsheet for NetExec☆33May 2, 2024Updated 2 years ago
- OSCP preperation and HackTheBox write ups.☆63Apr 2, 2023Updated 3 years ago
- Azure_Checklists☆43Feb 14, 2023Updated 3 years ago