fastfire / IsraelIranConflictLinks
List of groups that are carrying out cyber actions in the conflict between Israel and Iran.
β28Updated last week
Alternatives and similar repositories for IsraelIranConflict
Users that are interested in IsraelIranConflict are comparing it to the libraries listed below
Sorting:
- Capture screenshots of onion services on an onion service.β70Updated last year
- π€ The Modern, Blazing Fast Port Scanner π€β28Updated 7 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.β16Updated 6 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using theβ39Updated 4 months ago
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.β42Updated last month
- This repository presents a detailed case study on tracking cryptocurrency transactions and uncovering dark web operations. Using open-souβ¦β27Updated 3 months ago
- The app is used to download posts from Telegram feeds and save them to text files for later OSINT AI useβ50Updated 4 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β44Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.β27Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflowsβ42Updated 3 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious dβ¦β39Updated last year
- Find S3 AWS/GCP/Azure buckets while surfing. S3DNS acts as DNS server, follows CNAMEs and matches any bucket patternβ81Updated last month
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environmentsβ13Updated last year
- β24Updated last year
- β64Updated last year
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from β¦β14Updated 11 months ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Ericksonβ18Updated 5 years ago
- A Linkedin Activity date Finderβ51Updated 4 months ago
- Web Path Finderβ61Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.β121Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyβ¦β29Updated last year
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINTβ37Updated last year
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, loginβ¦β52Updated 3 weeks ago
- Tor onion address lookupβ39Updated 6 months ago
- Web Penetration Testing Course Materialsβ32Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β65Updated last year
- A meta-list of public references to threat actor profiles and APT group datasets.β67Updated last month
- Github Search is a quite powerful and useful feature that can be used to search for sensitive data on repositories. Collection of Github β¦β20Updated last year
- RADAR (Rapid Assessment of DNS And Reconnaissance) is an advanced DNS reconnaissance tool designed to identify technologies and services β¦β101Updated 4 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic β¦β25Updated 3 months ago