drego85 / HackInBoLinks
Official collection of HackInBo® talks, slides, and event programs.
☆82Updated last month
Alternatives and similar repositories for HackInBo
Users that are interested in HackInBo are comparing it to the libraries listed below
Sorting:
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- Your go-to resource for all things OSINT☆179Updated last year
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆41Updated 4 years ago
- scylla.sh db dumps and more☆138Updated 4 years ago
- c0r0n4con talk 12 april 2020☆23Updated 5 years ago
- Easy to configure Honeypot for Blue Team☆42Updated 2 months ago
- Malware vulnerability intel tool for third-party attackers☆122Updated 10 months ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- A tool designed to hunt for Phishing Kit source code☆224Updated 2 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆160Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆92Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- A WLAN red team framework.☆157Updated 10 months ago
- ☆69Updated 2 weeks ago
- A curated list of malware repositories, trackers and malware analysis tools☆86Updated 2 years ago
- Sniffing out well-known threat groups☆55Updated last year
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- OMLASP (Ideas Locas)☆20Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- Major tools used for Digital Forensic Investigation, includes tools used for Image, Audio, Memory, Network and Disk Image data analysis. …☆85Updated 4 years ago
- A collection of tools created for computer security research purposes.☆126Updated 5 years ago
- Web Application for domain name monitoring / alerting☆64Updated last year
- Forensic Analysis for Mobile Apps (FAMA) -- module for the Autopsy Forensic Browser☆152Updated last year
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆215Updated 3 years ago
- Valhalla API Client☆70Updated 2 years ago
- A minimalistic cross-platform malware scanner with non-blocking realtime filesystem monitoring using YARA rules.☆228Updated 3 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆105Updated last year
- A phishing kit collector for scavengers☆218Updated last week