attrition-org / web-hack-mirror
A copy of the Attrition.org web page hack / defacement mirror. Details: https://attrition.org/mirror/
☆20Updated 2 years ago
Alternatives and similar repositories for web-hack-mirror:
Users that are interested in web-hack-mirror are comparing it to the libraries listed below
- A memorial site for Hackers and Infosec people who have passed☆135Updated last week
- The open ransomware payment tracker☆93Updated 6 months ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated 10 months ago
- AHA! Website Source☆19Updated last month
- Honeyscanner: A vulnerability analyzer for honeypots☆38Updated 8 months ago
- Global IRT (Incident Response Team) is a project to describe common IRT and abuse contact information☆69Updated last year
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆32Updated 3 weeks ago
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆52Updated 4 years ago
- ☆8Updated 4 years ago
- CLI tools using Harpoon features☆21Updated last year
- PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, ..…☆125Updated last month
- ☆17Updated 5 years ago
- The new CVE website☆85Updated this week
- Stats about HTTP response security headers usage mentioned by the OSHP.☆13Updated 2 weeks ago
- Index and collection of MVT compatibile indicators of compromise.☆82Updated 4 months ago
- Various pentest stuff☆20Updated last month
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆34Updated 3 years ago
- Curated list of awesome, open source data exfiltration tools☆56Updated 3 years ago
- ☆53Updated 3 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 10 months ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆71Updated 5 years ago
- Tips to protect your personal and company data☆28Updated 4 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆99Updated last year
- UI, API, and Scanner (Rules Engine) services for Merry Maker☆122Updated 9 months ago
- THOR APT Scanner User Manual☆18Updated 2 weeks ago
- Collected and authored guides for personal and operational security.☆60Updated 2 years ago
- ☆22Updated 2 weeks ago
- Collection of videos of Raids on Cybercriminals☆19Updated last month
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- High signal information security sources Goggle.☆67Updated 2 years ago