cmlh / OSINTView external linksLinks
Open Source INTelligence
☆24Apr 19, 2020Updated 5 years ago
Alternatives and similar repositories for OSINT
Users that are interested in OSINT are comparing it to the libraries listed below
Sorting:
- ☆12Sep 25, 2020Updated 5 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Jul 9, 2012Updated 13 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- ☆63Jan 15, 2016Updated 10 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Advance URL Fuzzing + Whois Domain running on python☆18Nov 8, 2022Updated 3 years ago
- A Static Analysis Tool For Android Apps☆20Dec 19, 2025Updated last month
- Protect servers against crypto attacks☆18Mar 30, 2023Updated 2 years ago
- Export Maltego Graphs to JSON format☆21Nov 9, 2017Updated 8 years ago
- Source codes related to the articles about OSINT. Using social media APIs and Python language.☆23Jan 9, 2019Updated 7 years ago
- osint_tools_security_auditing☆156Oct 9, 2016Updated 9 years ago
- Retrieve someones private Facebook location, using their public information.☆58Jan 18, 2021Updated 5 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Maltego Local Transforms for Facebook☆75Dec 14, 2017Updated 8 years ago
- ☆29Feb 25, 2017Updated 8 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- Scripts created by MRG Effitas☆42Nov 22, 2016Updated 9 years ago
- osintstalker☆704Apr 3, 2015Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- A tool for enumerating the effective privileges of processes on an Android device.☆53May 1, 2014Updated 11 years ago
- A massive collection of Cybersecurity papers, guides and reports.☆10Jan 3, 2025Updated last year
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- A fuzzing utility for Android that focuses on reporting and delivery portions of the fuzzing process☆39Sep 4, 2014Updated 11 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Apr 18, 2013Updated 12 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- A home for my Java Katas.☆11Aug 24, 2021Updated 4 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- Examples related to Amazon Lightsail☆12Jul 17, 2024Updated last year
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- MATLAB Implementation of Harmony Search, a nature inspired optimization algorithm☆10Dec 1, 2016Updated 9 years ago