Tracking and documenting monthly insights about hacktivist coalitions.
☆23Sep 14, 2025Updated 5 months ago
Alternatives and similar repositories for hacktivist-coalitions
Users that are interested in hacktivist-coalitions are comparing it to the libraries listed below
Sorting:
- Convert your spreadsheet or CSV for the GIAC exam to a more compact index. Inspired by Voltaire and usable offline.☆19Jun 6, 2025Updated 8 months ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆22Aug 2, 2025Updated 7 months ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- Cloud Security Automation☆14Dec 2, 2020Updated 5 years ago
- Google Chrome internals analysis using Volatility☆42Nov 17, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆12Jan 28, 2026Updated last month
- Pound Load Balancer used in RELIANOID ADC for HTTP and HTTPS userspace management. It includes some features developed by the RELIANOID T…☆16Jan 2, 2025Updated last year
- A curation of awesome portfolio website ideas for developers and designers to draw inspiration from. Raise a pull request to add more. 💜…☆10Apr 10, 2025Updated 10 months ago
- for this repo i wish to keep an archive of available POCs and Descriptions alike,☆12Mar 24, 2022Updated 3 years ago
- Taller Cybercamp 2017. Seguridad ofensiva y defensiva con Machine Learning☆11Nov 30, 2017Updated 8 years ago
- Automatically converts your firefox browser into a hacking tool by installing required plugins.☆12Jun 26, 2017Updated 8 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- import library.zip in memory, with the interface the same as zipimport.☆10Jan 10, 2026Updated last month
- Python Scripts to Interact with VirusTotal, Malwares.com and Google Safe Browsing.☆11Dec 1, 2016Updated 9 years ago
- SearchToolkit is advanced collection of tools, hardwares, resources and cheatsheets useful for Pentester, Red Teamer, Bug Hunter, Forensi…☆21Feb 15, 2026Updated 2 weeks ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 2 years ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- A Polymer element to parse, validate, manipulate, and display dates using Moment.js.☆14Apr 2, 2019Updated 6 years ago
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆19Sep 10, 2025Updated 5 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 5 months ago
- ☆11Jun 4, 2021Updated 4 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- Small toolkit designed to enhance reconnaissance and logistical operations in OSCP labs☆14Feb 16, 2024Updated 2 years ago
- Apuntes de "Programación de servicios y procesos"☆12Nov 28, 2018Updated 7 years ago
- 基于领英的企业用户名收集☆13Feb 3, 2020Updated 6 years ago
- Random Code Store☆17Mar 27, 2023Updated 2 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- cyber security notes for your consumption.☆14Jul 30, 2024Updated last year
- Discord Remote Administration Tool fully written in Python3☆78Nov 4, 2025Updated 4 months ago
- Bot creado por el proyecto Cibervengadores, automatiza la recolección de indicadores de compromiso en un repostiroio público de GitHub☆15Jul 4, 2025Updated 8 months ago
- A collection of resources related to vulnerability management.☆15Aug 8, 2023Updated 2 years ago
- The BXAQ malware is used in China. They force tourists to install this app at the border. The malware downloads a tourist’s text messages…☆10Jul 12, 2019Updated 6 years ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 5 months ago
- Diseño y construcción de un planificador de procesos a corto plazo☆12Nov 9, 2019Updated 6 years ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆59Mar 4, 2023Updated 3 years ago
- Python API for generating Maltego mtgx files.☆18Sep 27, 2016Updated 9 years ago