attrition-org / web-hack-mirrorLinks
A copy of the Attrition.org web page hack / defacement mirror. Details: https://attrition.org/mirror/
☆21Updated 2 years ago
Alternatives and similar repositories for web-hack-mirror
Users that are interested in web-hack-mirror are comparing it to the libraries listed below
Sorting:
- Global IRT (Incident Response Team) is a project to describe common IRT and abuse contact information☆77Updated 2 years ago
- Index and collection of MVT compatibile indicators of compromise.☆121Updated 2 weeks ago
- ☆27Updated 6 months ago
- The open ransomware payment tracker☆101Updated 5 months ago
- Honeyscanner: A vulnerability analyzer for honeypots☆58Updated last month
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆50Updated 5 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆38Updated last year
- A memorial site for Hackers and Infosec people who have passed☆135Updated last month
- Maltego local and server integration for OpenCTI☆32Updated last year
- A collection of data fetchers, and simple quarterly and yearly CVE forecasting models.☆45Updated 4 months ago
- Public Issue tracker to gather feedback for and allow discussions around Malpedia☆36Updated 3 years ago
- The CVE.ORG website☆103Updated this week
- A collection of CyberChef recipes for decoding and decrypting strings in HTML attachments☆10Updated last year
- AHA! Website Source☆19Updated this week
- Batch IP geolocation script.☆21Updated 8 years ago
- A forensic system baselining, searching, and evidence collection tool☆19Updated 6 years ago
- Hacked up scripts to perform google searches☆16Updated last year
- ☆15Updated 3 years ago
- Welcome to the Meta Threat Research Indicator Repository, a dedicated resource for the sharing of Indicators of Compromise (IOCs) and oth…☆176Updated last month
- Collected and authored guides for personal and operational security.☆67Updated 3 years ago
- ☆101Updated 2 years ago
- ☆70Updated 5 years ago
- Detection Rule License (DRL)☆21Updated last year
- Static website for security.txt.☆68Updated 4 months ago
- Tips to protect your personal and company data☆27Updated 5 years ago
- Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started …☆318Updated last year
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Updated 2 weeks ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Updated last month
- AMI is a web application that helps people to create legal requests for copies of their personal information from data operators.☆32Updated 6 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago