drego85 / HackInBoLinks
Official collection of HackInBo® talks, slides, and event programs.
☆84Updated last month
Alternatives and similar repositories for HackInBo
Users that are interested in HackInBo are comparing it to the libraries listed below
Sorting:
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- Run several volatility plugins at the same time☆116Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆87Updated 5 years ago
- Forensic Analysis for Mobile Apps (FAMA) -- module for the Autopsy Forensic Browser☆153Updated last year
- scylla.sh db dumps and more☆139Updated last month
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 4 years ago
- URL fingerprinting made easy☆89Updated last year
- OSINT dating tool for web pages☆122Updated 5 years ago
- Your go-to resource for all things OSINT☆181Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- c0r0n4con talk 12 april 2020☆23Updated 5 years ago
- A WLAN red team framework.☆154Updated last year
- ☆30Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- Industrial Hacking Simulator☆27Updated last week
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆42Updated 5 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆134Updated 3 years ago
- Magicleaks it's a python script that checks if an email or a list of email accounts was compromised☆71Updated 4 years ago
- System based on +500 blacklists to detect internet potencialy malicious hosts☆150Updated this week
- A tool designed to hunt for Phishing Kit source code☆229Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 4 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Ransomware leak site monitoring☆316Updated 3 years ago
- PDFExaminer Tool - Analyse PDF Malware☆63Updated 4 years ago
- Forensic Analysis of Signal, Wickr, Threema - Decrypt all databases and multimedia files☆76Updated 3 years ago
- A library that scrapes Linkedin for user data☆24Updated 4 years ago
- Unique hashes.org "founds" sorted by occurrence. (November 2019)☆86Updated 6 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆146Updated last month