deptofdefense / rtfn-mil
☆14Updated 6 years ago
Related projects: ⓘ
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Updated 4 years ago
- ☆24Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- SANS CTI Summit 2021 Resources☆11Updated last year
- Collection of my slide decks & conference videos☆27Updated 3 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆92Updated 4 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆58Updated 4 years ago
- Some YARA rules i will add from time to time☆12Updated 5 years ago
- SecrutiyTube Linux Assembly Exam☆10Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- Hashes of infamous malware☆24Updated last year
- ☆15Updated this week
- Content for cyber defense course☆14Updated 9 years ago
- Maltego integration of https://clearbit.com☆32Updated 3 years ago
- Maltego local and server integration for OpenCTI☆29Updated last month
- OSINT tool to evaluate the trustworthiness of a company☆39Updated 4 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- Following repository contains source codes used in my two Books.☆10Updated 8 years ago
- ☆26Updated 2 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated this week
- A simple way to exfiltrate data using spotify API☆17Updated 2 weeks ago
- Fuzzer for finding Open Mail Relays☆14Updated 3 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 6 years ago
- Standardizing Security Titles☆13Updated last year
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 3 years ago
- A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords…☆20Updated 4 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆35Updated last year