cibervengadores / IOCsLinks
Bot creado por el proyecto Cibervengadores, automatiza la recolección de indicadores de compromiso en un repostiroio público de GitHub
☆15Updated 4 months ago
Alternatives and similar repositories for IOCs
Users that are interested in IOCs are comparing it to the libraries listed below
Sorting:
- Househole prioritizes privacy, security, and control, while helping users remain undetected by services that identify temporary emails.☆33Updated last year
- ☆55Updated last year
- Herramienta para detectar correos de phishing mediante análisis DKIM, SPF, y WHOIS☆32Updated last year
- A comprehensive automation script for penetration testing and reconnaissance.☆43Updated last year
- ☆27Updated last year
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆35Updated last month
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆49Updated last year
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆108Updated 5 months ago
- RansomwareSim is a simulated ransomware☆166Updated last year
- PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in fi…☆183Updated 3 months ago
- This repo contains the Dockerfiles to deploy a pivoting lab!☆46Updated 3 weeks ago
- Herramienta para escanear y listar dispositivos activos en la red local sin obtener tanta información como en NMAP y sin tener que saber…☆29Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- ☆65Updated 2 years ago
- Máquina virtual educativa que simula los sistemas usados por una empresa eléctrica: control de consumo, monitoreo industrial y cibersegur…☆45Updated last month
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆29Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.☆71Updated last month
- A collection of tools that I use in CTF's or for assessments☆102Updated 9 months ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆13Updated 2 years ago
- Enter Morpheus, your advanced IOC detection tool. Powered by expert YARA rules and integrated with VirusTotal, it scans and identifies In…☆55Updated 9 months ago
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- Una serie de scripts útiles en un proceso de pentesting.☆43Updated 3 months ago
- wp-config-scan☆81Updated 2 years ago
- ☆129Updated 5 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆142Updated last year
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆18Updated last year
- ☆28Updated last year
- Discovering Typo Squatting on your domains!☆79Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24Updated last year