specialized investigative framework to investigate cases of malicious actors in the OSINT and backup LeakBase
☆67Aug 7, 2025Updated 7 months ago
Alternatives and similar repositories for LeakBaseCTI
Users that are interested in LeakBaseCTI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Jul 23, 2025Updated 8 months ago
- 🌟 Stardex: Explore GitHub Stars Intelligently. Stardex is a powerful web app that lets you search, filter, and cluster any GitHub user's…☆13Mar 17, 2026Updated last week
- ☆50Oct 14, 2025Updated 5 months ago
- AndroidSubSystem4GNU/Linux☆36Dec 30, 2025Updated 2 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 9 months ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 3 years ago
- A web scrape of Darknetlive. Incognito Market admin has removed the news page. This scrape has everything including the news.☆31Dec 17, 2024Updated last year
- The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for mult…☆19Oct 18, 2024Updated last year
- Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin <= 5.7.14 - Unauthenticated SQL Injection☆20Sep 15, 2024Updated last year
- TRC20 Wallet Listen Events☆11Aug 30, 2023Updated 2 years ago
- Adversary Simulation Framework☆38Aug 19, 2025Updated 7 months ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 6 months ago
- Malware that we analyzed on our site.☆27Nov 12, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆10Dec 12, 2025Updated 3 months ago
- It's an AI Agent that analyzes PDFs (provided locally or via the web) using SenecaLLMs fine-tuned for cybersecurity. It identifies sensit…☆18Feb 12, 2025Updated last year
- An example code of CiGetCertPublisherName☆16Mar 24, 2022Updated 4 years ago
- Daily C2 threat intelligence feed☆19Updated this week
- Here you can find writeups from various CTFs that I've participated in.☆12Jul 30, 2023Updated 2 years ago
- HTB recon tool to simplify part of the enumeration process☆13May 14, 2025Updated 10 months ago
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- A comprehensive collection of Open Source Intelligence (OSINT) tools and resources for cybersecurity professionals, researchers, and inve…☆29Feb 4, 2026Updated last month
- MCP Servers en Málaga con salero☆22Oct 28, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- just for fun☆18Jan 21, 2025Updated last year
- A powerful OSINT (Open-Source Intelligence) tool for searching usernames across 50+ social media platforms, with AI-powered analysis and …☆20Sep 7, 2025Updated 6 months ago
- RWX Section Abusing☆16Nov 19, 2023Updated 2 years ago
- Selective In-Memory Syscall Unhooking, a stealthy method to bypass user-mode hooks in ntdll.dll☆37Mar 11, 2026Updated 2 weeks ago
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆165Dec 31, 2025Updated 2 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆51Jan 16, 2026Updated 2 months ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆29Jul 26, 2024Updated last year
- A unified CLI and library for managing architectural artifacts (RFCs, ADRs, Decomposition Plans) with plugins, impact analysis, and healt…☆29Dec 15, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆54Oct 6, 2025Updated 5 months ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆32Jan 27, 2026Updated 2 months ago
- ShutNet, is a 'virus'(it is not) that will automaticly shut down every device connected.☆18Apr 15, 2023Updated 2 years ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- ☆53May 18, 2024Updated last year
- A simple, easy to use and extendible JSON database.☆18Apr 24, 2023Updated 2 years ago
- A class to emulate the behavior of NtQuerySystemInformation when passed the SystemHypervisorDetailInformation information class☆27Sep 15, 2023Updated 2 years ago