drego85 / HackInBoLinks
Official collection of HackInBo® talks, slides, and event programs.
☆84Updated 2 months ago
Alternatives and similar repositories for HackInBo
Users that are interested in HackInBo are comparing it to the libraries listed below
Sorting:
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆86Updated 5 years ago
- Forensic Analysis for Mobile Apps (FAMA) -- module for the Autopsy Forensic Browser☆152Updated last year
- Run several volatility plugins at the same time☆117Updated 3 years ago
- Your go-to resource for all things OSINT☆180Updated last year
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- c0r0n4con talk 12 april 2020☆23Updated 5 years ago
- scylla.sh db dumps and more☆139Updated 2 months ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆56Updated 4 years ago
- A WLAN red team framework.☆155Updated last week
- FIT is a modular suite of Python applications for digital forensic acquisition of online contents such as web pages, emails, social media…☆93Updated 3 months ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆86Updated 6 years ago
- OSINT dating tool for web pages☆122Updated 5 years ago
- ☆24Updated 4 years ago
- A compilation of scripts and scans for discovering and enumerating industrial control and SCADA devices. Utilizing open-source tools, I h…☆46Updated 2 years ago
- Ransomware leak site monitoring☆314Updated 3 years ago
- A tool designed to hunt for Phishing Kit source code☆229Updated last week
- A CLI tool to identify the hash type of a given hash.☆113Updated 3 years ago
- Easy to configure Honeypot for Blue Team☆43Updated 7 months ago
- Dictionary of CTI-related acronyms, terms, and jargon☆146Updated 2 months ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 4 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆228Updated 3 years ago
- ☆110Updated 5 years ago
- Distrubición Linux para Osint☆56Updated 7 years ago
- A simple demonstration tool to simulate a ransomware attack☆41Updated 2 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆98Updated 4 years ago
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆230Updated 3 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆178Updated this week