bioniccyber / SocialMediaIntelLinks
A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords/phrases.
☆21Updated 5 years ago
Alternatives and similar repositories for SocialMediaIntel
Users that are interested in SocialMediaIntel are comparing it to the libraries listed below
Sorting:
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Useful commands for infosec☆29Updated 2 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- URL fingerprinting made easy☆89Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 8 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- ☆29Updated 9 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 weeks ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Updated 5 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Updated 5 years ago
- ☆25Updated 3 years ago
- OSINT tool to evaluate the trustworthiness of a company☆43Updated 5 years ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- ☆15Updated 3 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- ☆33Updated 8 months ago
- Home to the ActorTrackr source code☆29Updated 8 years ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- ☆42Updated 6 months ago
- A quick reference guide for python script development in DFIR☆18Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 3 years ago
- python wrapper to use tshark for file extraction from the command line.☆26Updated 6 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- ☆22Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆34Updated last year
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆56Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- A scanner for taking basic fingerprints☆53Updated 5 years ago
- This is a python version of samesame repo to generate homograph strings☆24Updated 7 years ago