danielcuthbert / thescumLinks
This is an attempt to footprint all the trackers and profiling attempts used by numerous UK newspapers operating online, papers known for being liberal with the truth. It is a work in progress and the trackers listed here can also apply to other aspects of the web we use today.
☆68Updated 5 years ago
Alternatives and similar repositories for thescum
Users that are interested in thescum are comparing it to the libraries listed below
Sorting:
- A collection of online trackers, advertising networks, telemetry collectors and general 'we like to watch' lists for you to use to get be…☆114Updated 4 years ago
- first commit☆20Updated 4 months ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Updated 7 years ago
- Universal Honey Pot☆29Updated 5 months ago
- ☆61Updated 6 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 7 months ago
- A Passive SSH back-end and scanner.☆104Updated 7 months ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Updated 2 years ago
- Repo for MIRR Workshop Heroku app☆52Updated 5 years ago
- A bunch of scripts I use to work with urlscan.io☆35Updated 6 years ago
- Mike Lindell's cybersymposium files☆48Updated 4 years ago
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆148Updated 11 months ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated 2 years ago
- This is a list of Computer and Network Security Axioms☆30Updated 5 years ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- Serverless honeytoken 🕵🏻♂️☆81Updated 3 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 6 years ago
- Simple NLP and bulk OCR text processing script suite.☆47Updated 7 years ago
- GCP and GSUITE security auditing scripts☆27Updated last year
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Updated 2 years ago
- Vendor Security Model Contract☆97Updated 3 years ago
- A CVE Heatmap Using CalPlot☆97Updated 5 years ago
- ⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews☆37Updated last year
- A Docker Container To Continually Scan Your Network And Display Findings Cleanly.☆70Updated 7 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 7 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- Utility to generate similar IDN domain names☆48Updated 7 years ago
- Extract deleted secrets from git repos☆61Updated 8 years ago
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago