drego85 / HackInBo
Official collection of HackInBo® talks, slides, and event programs.
☆78Updated 3 weeks ago
Alternatives and similar repositories for HackInBo:
Users that are interested in HackInBo are comparing it to the libraries listed below
- A ransomware group monitoring bot written in C#.☆56Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated last year
- Cerchiamo di creare la più completa lista di wordlist italiane☆12Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆115Updated 5 months ago
- A WLAN red team framework.☆151Updated 5 months ago
- A set of recipes useful in pentesting and red teaming scenarios☆141Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- A simple demonstration tool to simulate a ransomware attack☆36Updated last year
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆56Updated 2 years ago
- ☆141Updated last year
- htpw is a project to increase the security of your WordPress!☆52Updated 6 months ago
- Your go-to resource for all things OSINT☆165Updated last year
- Extracting IoC data from eMail☆131Updated 3 months ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆115Updated 2 years ago
- OSINT dating tool for web pages☆116Updated 4 years ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆224Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- Questo repository traccia le attività del gruppo operativo per la sperimentazione di un meccanismo di Info Sharing fatto dalla community …☆15Updated 3 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆43Updated 2 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- URL fingerprinting made easy☆86Updated 11 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆124Updated last year
- ☆21Updated 4 years ago
- Slides for my conference talks☆43Updated last year
- Uncover the full name of a target on Linkedin.☆161Updated 2 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆79Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆76Updated last month
- Source of the project website☆25Updated 2 weeks ago