abbyslab / social-user-probeLinks
Browser extension for launching multi-platform OSINT queries from grouped YAML profiles.
β10Updated last month
Alternatives and similar repositories for social-user-probe
Users that are interested in social-user-probe are comparing it to the libraries listed below
Sorting:
- Rules shared by the community from 100 Days of YARA 2025β33Updated 4 months ago
- π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Goβ¦β37Updated this week
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?β43Updated this week
- Cyber threat intelligence tool suite.β37Updated 2 months ago
- Living Off Security Toolsβ45Updated 7 months ago
- NOVA: The Prompt Pattern Matchingβ111Updated last month
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.β34Updated 10 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β124Updated last year
- A series of python scripts to extract information from Dark Web Applicationsβ12Updated 2 months ago
- π§° ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.β74Updated last month
- God Mode Detection Rulesβ134Updated 9 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999β38Updated this week
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.β35Updated last month
- β74Updated 2 months ago
- AI-Powered Dark Web OSINT Toolβ72Updated last month
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the β¦β70Updated 11 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyβ¦β29Updated last year
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.β43Updated last month
- When good OAuth apps go rogue. Documents observed OAuth application tradecraftβ75Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matchesβ46Updated 2 months ago
- BlueSky OSINT Toolβ14Updated 5 months ago
- Knowledge base on cybercriminal concealment techniquesβ68Updated 3 weeks ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β47Updated last year
- A cybersecurity tool designed to safeguard against IDN Homograph Attacksβ37Updated 6 months ago
- Baseline a Windows System against LOLBASβ27Updated last year
- β32Updated 5 months ago
- Automation tool for Windows Deception Host Burn-Inβ86Updated 6 months ago
- create a "simulated internet" cyber range environmentβ16Updated last week
- A curated list of awesome resources related to enhancing your enterprise Email Securityβ48Updated 2 months ago
- Protection against HTML smuggling attacks.β96Updated this week