fastfire / IsraelPalestineConflict
List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.
☆25Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for IsraelPalestineConflict
- Regular Expressions List used in Digital Forensic Tasks☆74Updated 9 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆120Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated 10 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆128Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆54Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆138Updated 7 months ago
- ☆55Updated 6 months ago
- Discover and track internet assets using favicon hashes through search engines.☆121Updated last month
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆73Updated 2 weeks ago
- ☆134Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 4 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆42Updated 2 weeks ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆110Updated 7 months ago
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆40Updated last year
- Automate Scoping, OSINT and Recon assessments.☆92Updated 2 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆39Updated 10 months ago
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆88Updated 5 months ago
- ☆62Updated last year
- Powershell tools used for Red Team / Pentesting.☆74Updated 10 months ago
- Just some lists of Malware Configs☆159Updated last month
- Capture screenshots of onion services on an onion service.☆49Updated 5 months ago
- Shodan Dorks 2023☆232Updated last year
- 🕵️ Email osint tool☆60Updated last year
- Useful resources about phishing email analysis☆76Updated 2 years ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated 9 months ago
- ☆43Updated 7 months ago
- A PlayBook for OSWP & Wireless Pentest☆32Updated 3 months ago
- ☆128Updated last year
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆69Updated 2 months ago