Have you ever wanted to search a link or IP address on multiple OSINT pages at once?
☆59Jul 7, 2025Updated 8 months ago
Alternatives and similar repositories for osint
Users that are interested in osint are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 8 months ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated last year
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 3 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- IOCs collected during day-to-day activities☆119Updated this week
- ANY.RUN sandbox detection collection☆22Aug 21, 2024Updated last year
- A tool to remotely detect unusual sessions opened on windows machines using RPC☆120Jun 10, 2025Updated 9 months ago
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆54Sep 11, 2025Updated 6 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- A tool to grab session cookies of any website from an android phone and by-pass 2FA.☆11May 8, 2020Updated 5 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆76Oct 2, 2025Updated 5 months ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆32Jul 7, 2025Updated 8 months ago
- ☆24Mar 5, 2026Updated 2 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- LDAP Enumeration Tool for Pentesters☆48Apr 22, 2025Updated 11 months ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- The PowerShell Get Real Repository developed for IT Pros to learn and embrace PowerShell in a lab setting.☆17Nov 11, 2020Updated 5 years ago
- A repository to share publicly available Velociraptor detection content☆196Mar 15, 2026Updated last week
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆16Sep 2, 2022Updated 3 years ago
- ☆93Jul 30, 2025Updated 7 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A list of the best cybersecurity research related blogs.☆33May 26, 2025Updated 10 months ago
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services …☆104Apr 11, 2025Updated 11 months ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- SAST and DAST Scan Supported with 400 plus rules available for secrets and allow you add your own wordlist as well. lightweight source c…☆110Aug 21, 2025Updated 7 months ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- Convert your spreadsheet or CSV for the GIAC exam to a more compact index. Inspired by Voltaire and usable offline.☆19Jun 6, 2025Updated 9 months ago
- ☆12Jun 24, 2023Updated 2 years ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated last year
- My Gitbook CyberSec Notes☆20Oct 22, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Automatic Enumeration is a command line utility that automatically tries to collect and retrieve various pieces of information from a tar…☆15Apr 21, 2025Updated 11 months ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Stores Azure DC IP addresses☆13Nov 15, 2024Updated last year
- ☆105Jul 5, 2025Updated 8 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆214Mar 4, 2026Updated 3 weeks ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Apr 23, 2024Updated last year