VECERTUSA / LeakBaseCTILinks
specialized investigative framework to investigate cases of malicious actors in the OSINT and backup LeakBase
β59Updated last month
Alternatives and similar repositories for LeakBaseCTI
Users that are interested in LeakBaseCTI are comparing it to the libraries listed below
Sorting:
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.β61Updated 2 months ago
- π΅οΈ Email osint toolβ62Updated 2 years ago
- All-sources tool to search websites by faviconsβ172Updated 10 months ago
- Capture screenshots of onion services on an onion service.β72Updated last year
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, aβ¦β98Updated last year
- automated Open Source Intelligence gatheringβ131Updated last month
- Discovering Typo Squatting on your domains!β73Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services β¦β101Updated 5 months ago
- Discover and monitor internet assets using favicon hashes across search engines.β215Updated 8 months ago
- NetProbe: Network Probeβ164Updated 11 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.β39Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Supportβ34Updated last year
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.β56Updated 2 months ago
- A OSINT project that explores how to dump data from Reactβ77Updated 2 weeks ago
- Tor onion address lookupβ55Updated last month
- Chrome Extensions for OSINTβ111Updated 3 months ago
- The app is used to download posts from Telegram feeds and save them to text files for later OSINT AI useβ51Updated 6 months ago
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate aβ¦β53Updated 3 months ago
- A Linkedin Activity date Finderβ57Updated 5 months ago
- Web Path Finderβ61Updated last year
- β123Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β65Updated last year
- β24Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.β121Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gatheringβ‘.β60Updated 10 months ago
- Keklick - C2 Hunting, Reporting and Visualization Toolβ62Updated 2 months ago
- β125Updated 3 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β45Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β126Updated 6 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINTβ37Updated last year