fastfire / deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
☆4,518Updated this week
Related projects ⓘ
Alternatives and complementary repositories for deepdarkCTI
- Tools and Techniques for Red Team / Penetration Testing☆6,026Updated last year
- Tools and Techniques for Blue Team / Incident Response☆2,833Updated 7 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆5,678Updated last month
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,593Updated last year
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆2,969Updated last week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,739Updated 5 months ago
- List of Awesome Red Teaming Resources☆6,908Updated 10 months ago
- Tools & Interesting Things for RedTeam Ops☆2,145Updated 2 years ago
- ⭐️ A curated list of awesome forensic analysis tools and resources☆3,999Updated last week
- You didn't think I'd go and leave the blue team out, right?☆1,610Updated last year
- Red Teaming Tactics and Techniques☆4,065Updated 2 months ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆2,856Updated last year
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆5,850Updated 5 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,106Updated 2 months ago
- 🎯 Command Injection Payload List☆3,008Updated 4 months ago
- game of active directory☆5,429Updated this week
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆3,847Updated 4 months ago
- The Havoc Framework☆6,860Updated this week
- Mind-Maps of Several Things☆2,451Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,105Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,337Updated 11 months ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆926Updated this week
- Interesting APT Report Collection And Some Special IOC☆2,439Updated this week
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆3,875Updated 3 weeks ago
- Offensive Software Exploitation Course☆2,343Updated last year
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,657Updated 10 months ago
- ☆2,158Updated last year
- Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.☆4,098Updated 2 weeks ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,422Updated 2 weeks ago
- Top disclosed reports from HackerOne☆3,898Updated last week