BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploitation, Reporting, Darkweb, Deepweb, Research
☆59Jan 5, 2026Updated 3 months ago
Alternatives and similar repositories for 365
Users that are interested in 365 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago
- This repository was created to put into practice the knowledge acquired in hacking courses at Escola de Hackers with master and mentor Ma…☆19Jul 8, 2024Updated last year
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Issuer Identification Number Database and Verification Utility Library. Luhn Algorithm, BIN Checker, Random Credit Card Generators.☆24Jan 13, 2024Updated 2 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 8 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- A real-time seismic monitor for prediction markets☆51Sep 14, 2025Updated 7 months ago
- ☆12Feb 8, 2023Updated 3 years ago
- Some extracted Features\IoCs\Artifacts\Patterns from APT Malware☆14Mar 4, 2020Updated 6 years ago
- Scanning Result of MetaScan's AI GPTScan Engine for 13 DefiHacks Projects under 10 Logic Vuln Types☆13Aug 8, 2023Updated 2 years ago
- Extract data from a .git directory.☆15Mar 28, 2023Updated 3 years ago
- OPNsense fork of the original DragonFlyBSD installer☆13Jan 12, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Speech Recognition in python☆10Jul 12, 2018Updated 7 years ago
- Query GraphSense clusters, details and attribution tag-packs directly in Maltego. By an initial idea of our Swiss Federal Police colleag…☆40Dec 28, 2024Updated last year
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- an osint automation tool written in Batchfile for lookups including person, phone number, email, license plate, and VIN. this tool only w…☆71Oct 5, 2020Updated 5 years ago
- Collection of OSINT articles to get you started in understanding OSINT techniques☆34Nov 13, 2021Updated 4 years ago
- Rayomd is a gathering information Framework for pentesters and bug bounty hunters☆28Jan 24, 2023Updated 3 years ago
- PHP: Host your own Dynamic DNS via a ( Raspbery Pi with static IP || cheap VPS ), with a PowerDNS backend, web interface. Now that this …☆12Apr 23, 2014Updated 11 years ago
- The DNS Hunt will make your life easier, and of course faster.☆47Nov 15, 2020Updated 5 years ago
- A proving grounds for young and aspiring BBOT modules☆15Apr 1, 2026Updated 2 weeks ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- TRC20 Wallet Listen Events☆11Aug 30, 2023Updated 2 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- GreyNoise Maltego integration and transforms☆19Mar 14, 2023Updated 3 years ago
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- floods an email address with emails☆32Oct 8, 2021Updated 4 years ago
- An osint tool that uses Ahmia.fi to get hidden services and descriptions that match with the users query.☆263Dec 14, 2025Updated 4 months ago
- This repostiory contains the python code of command and control trojan which will be controlled from the GitHub repo which contains the c…☆15Feb 17, 2023Updated 3 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Gets info from truepeoplesearch.com and adds it to Maltego☆31Nov 27, 2018Updated 7 years ago
- Perplexity.ai clone recipe for a DIY api or ChatGPT citing sources☆11Mar 14, 2023Updated 3 years ago
- Simple tool written in C# that tries to salvage a corrupted wallet.dat which is used in most of the crypto-coin wallet tools.☆10Mar 1, 2017Updated 9 years ago
- ChatGPT_DARE: An AI-Powered GPT-4 Chatbot with Unrestricted Capabilities☆11Apr 4, 2023Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆19Jan 1, 2018Updated 8 years ago
- a simple chat server for the esp8266.☆10May 19, 2021Updated 4 years ago
- A pen-test/DoS tool that can be used to send single or multiple packets in sequences with a lot of packet customization.☆39Dec 9, 2022Updated 3 years ago