VECERTUSA / LeakBaseCTILinks
specialized investigative framework to investigate cases of malicious actors in the OSINT and backup LeakBase
β58Updated 2 months ago
Alternatives and similar repositories for LeakBaseCTI
Users that are interested in LeakBaseCTI are comparing it to the libraries listed below
Sorting:
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.β63Updated 2 months ago
- π΅οΈ Email osint toolβ62Updated 2 years ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β126Updated 7 months ago
- Capture screenshots of onion services on an onion service.β72Updated last year
- β65Updated last year
- All-sources tool to search websites by faviconsβ176Updated 11 months ago
- IoT Camera Reconnaissance and Live Viewerβ164Updated last year
- β126Updated 4 months ago
- Information stealer logs parserβ79Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Toolβ62Updated 3 months ago
- The app is used to download posts from Telegram feeds and save them to text files for later OSINT AI useβ51Updated 6 months ago
- A Linkedin Activity date Finderβ63Updated 6 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Supportβ34Updated last year
- NetProbe: Network Probeβ164Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeβ¦β157Updated 7 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINTβ37Updated last year
- Helping you delete your old accountsβ86Updated 2 years ago
- automated Open Source Intelligence gatheringβ133Updated 2 months ago
- Web Path Finderβ61Updated last year
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.β59Updated 3 months ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source cβ¦β102Updated 2 months ago
- A collection of tools and resources useful for OSINT investigations in the cryptocurrency. This is a dynamic list. βmost resources here aβ¦β68Updated 4 months ago
- A OSINT project that explores how to dump data from Reactβ81Updated last month
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, aβ¦β98Updated last year
- β24Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.β101Updated 11 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.β139Updated 2 years ago
- Tor onion address lookupβ55Updated 2 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.β53Updated 4 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.β39Updated last year