fastfire / IsraelPalestineConflict
List of groups that are carrying out cyber actions in the conflict between Israel and Palestine.
☆27Updated 9 months ago
Alternatives and similar repositories for IsraelPalestineConflict:
Users that are interested in IsraelPalestineConflict are comparing it to the libraries listed below
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆60Updated last year
- Regular Expressions List used in Digital Forensic Tasks☆79Updated 11 months ago
- Just some lists of Malware Configs☆168Updated 3 weeks ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆130Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last year
- Discover and monitor internet assets using favicon hashes across search engines.☆157Updated 2 weeks ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆122Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆40Updated last year
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆99Updated 5 months ago
- Strumenti VATINT - Intelligence sui veicoli e sui trasporti☆90Updated 4 months ago
- Solid Python toolkit for those in the security industry. Some by me, most by smarter people.☆57Updated last week
- ☆32Updated last month
- ☆55Updated 8 months ago
- SIEM Cheat Sheet☆73Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆27Updated 8 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆76Updated 2 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆72Updated 4 months ago
- Free training course offered at Hack Space Con 2023☆137Updated last year
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆40Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆116Updated 9 months ago
- A collection of CVEs weaponized by ransomware operators☆103Updated 3 weeks ago
- A repository of credential stealer formats☆172Updated last week
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- A categorized list of resources presented during the 2023 Sans OSINTSummit☆161Updated last year
- Strumenti di Acquisizione e Analisi di copie Forensi☆145Updated 10 months ago
- ☆130Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆117Updated last year
- Digital Forensics and Incident Response (DFIR)☆96Updated last month
- Building a consolidated RSS feed for articles about cyberattacks☆64Updated this week