Open Source INTelligence
☆24Apr 19, 2020Updated 5 years ago
Alternatives and similar repositories for OSINT
Users that are interested in OSINT are comparing it to the libraries listed below
Sorting:
- ☆12Sep 25, 2020Updated 5 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Jul 9, 2012Updated 13 years ago
- A collection of scripts that pull Open Source Information from the web. Eventually the goal is to put this into a large modular style dat…☆55Apr 14, 2015Updated 10 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- ☆63Jan 15, 2016Updated 10 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- Dockerfile to build a ShadowSocks (made in pure C with libev) server☆13Apr 17, 2016Updated 9 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Advance URL Fuzzing + Whois Domain running on python☆18Nov 8, 2022Updated 3 years ago
- Protect servers against crypto attacks☆18Mar 30, 2023Updated 2 years ago
- A Static Analysis Tool For Android Apps☆20Dec 19, 2025Updated 2 months ago
- Export Maltego Graphs to JSON format☆21Nov 9, 2017Updated 8 years ago
- Source codes related to the articles about OSINT. Using social media APIs and Python language.☆23Jan 9, 2019Updated 7 years ago
- Retrieve someones private Facebook location, using their public information.☆58Jan 18, 2021Updated 5 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- Scripts created by MRG Effitas☆42Nov 22, 2016Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- osintstalker☆705Apr 3, 2015Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Apr 18, 2013Updated 12 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Apr 22, 2018Updated 7 years ago
- A home for my Java Katas.☆11Aug 24, 2021Updated 4 years ago
- A simple npm module that checks to see whether or not a medical marijuana patient's recommendation ID is valid or not.☆10Dec 11, 2022Updated 3 years ago
- MIDI Synthesizer for Arduino☆10Dec 7, 2015Updated 10 years ago
- Abuse adapts to technology. You deserve privacy and compassion.☆13Mar 26, 2017Updated 8 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Markup and notes for my Functional Programming 101 workshop☆10Jan 11, 2017Updated 9 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago