VECERTUSA / DarkForumCTIView external linksLinks
specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.
☆73Jul 29, 2025Updated 6 months ago
Alternatives and similar repositories for DarkForumCTI
Users that are interested in DarkForumCTI are comparing it to the libraries listed below
Sorting:
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆38Jul 28, 2025Updated 6 months ago
- Darkweb_Crawler - is an advanced, stealthy Python-based dark web intelligence platform designed for authorized security professionals and…☆113Dec 4, 2025Updated 2 months ago
- A robust Python-based OSINT tool designed for validating and investigating email addresses across social media platforms and known data b…☆62Aug 6, 2025Updated 6 months ago
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆47Jun 1, 2025Updated 8 months ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- ☆18Sep 27, 2025Updated 4 months ago
- A user-friendly Python toolkit for open source intelligence, providing key features such as image geolocation, social media profiling, em…☆223Sep 1, 2025Updated 5 months ago
- Basic brute-force script targeting the standard Keycloak Admin/User Console browser login flow.☆25Apr 6, 2025Updated 10 months ago
- Automated pentest report writing and generation using DOCX templates and markdown.☆24Apr 1, 2025Updated 10 months ago
- A repository containing the research output from my GCFE Gold Paper which compared Windows 10 and Windows 11.☆27Jul 27, 2022Updated 3 years ago
- ☆22Jan 11, 2025Updated last year
- 🕵️ OSINT Tool (github tracker)☆164May 31, 2024Updated last year
- CVE-2025-49144 PoC for security researchers to test and try.☆85Jun 30, 2025Updated 7 months ago
- Some useful books related to Cybersecurity, Linux and more.☆71Dec 31, 2025Updated last month
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 7 months ago
- A fast Go-based tool to uncover sensitive information in JavaScript☆37Jul 6, 2025Updated 7 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆35May 1, 2025Updated 9 months ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆25Aug 13, 2023Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆73Jun 11, 2024Updated last year
- A stealthy Python dark web scraper using Tor. Crawl .onion sites anonymously, with retries, rate-limiting, and automatic Tor circuit rene…☆66Aug 5, 2025Updated 6 months ago
- Private nuclei templates for BBP and OT/IIoT/MIoT enumeration, use responsibly☆34Aug 27, 2025Updated 5 months ago
- A collection of PoCs to do common things in unconventional ways☆122Aug 31, 2025Updated 5 months ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆448May 23, 2025Updated 8 months ago
- Convert your shellcode into an ASCII string☆127Jun 27, 2025Updated 7 months ago
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆36Updated this week
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆29Jun 26, 2023Updated 2 years ago
- Security reconnaissance and assessment tool for identifying potentially exposed IP cameras by analyzing open ports, service configuration…☆773Jan 6, 2026Updated last month
- Microsoft Network Service Fingerprinting Tool☆67Jan 2, 2026Updated last month
- ECC Public Key Cryptography☆37Oct 29, 2023Updated 2 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- ☆12Feb 4, 2025Updated last year
- Living off the False Positive!☆41Jan 31, 2025Updated last year
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆36Nov 16, 2023Updated 2 years ago
- ☆13Sep 7, 2023Updated 2 years ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆159Jun 13, 2025Updated 8 months ago
- Tool to start processes as SYSTEM using token duplication☆38Oct 27, 2020Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- OSINTinvestigation - Tecniche OSINT - Strumenti - DeepWeb - Archivio☆108Nov 7, 2025Updated 3 months ago