Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still need to investigate further, especially when their bosses request it. These threat feeds often refer to sources using terms like "hacker forum" or "underground forum" without specifying names.
☆12Sep 18, 2025Updated 6 months ago
Alternatives and similar repositories for What_is_this_forum
Users that are interested in What_is_this_forum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆61Sep 18, 2025Updated 6 months ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated 3 weeks ago
- A static file containing a list of popular RSS feeds.☆13Aug 25, 2016Updated 9 years ago
- A Python script and executable for simulating the GPS location of an iOS 17 device connected to your computer using pymobiledevice3. Prov…☆12Jan 10, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Translate srt subtitles through Google Translation API☆16Apr 20, 2018Updated 7 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- ☆25Feb 8, 2026Updated 2 months ago
- Script for deploying CTF tools (Linux) tested on Kali 2☆12Feb 15, 2021Updated 5 years ago
- Use RError instead of Error in Node.js and the browser. It provides nested information about the cause of failure without significant imp…☆14Sep 24, 2024Updated last year
- reveal origins behind reverse proxies & hidden services☆37Aug 23, 2025Updated 7 months ago
- Go fast from target Facebook profile to target's Marketplace account☆34May 7, 2023Updated 2 years ago
- Game programming samples and techniques☆24Apr 4, 2024Updated 2 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- DIY security toolset for Cisco's Packet Tracer (version7.2)☆15Aug 17, 2021Updated 4 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- ☆16Sep 23, 2021Updated 4 years ago
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Some Cheat Sheet for Red Team☆17Dec 30, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Collection of videos of Raids on Cybercriminals☆22Mar 19, 2025Updated last year
- Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.☆12Jun 22, 2022Updated 3 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated 3 weeks ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆36Apr 9, 2026Updated last week
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆36Jan 14, 2025Updated last year
- 📦 Typescriot react perttier example using parcel bundler☆15Mar 7, 2018Updated 8 years ago
- Feed of phish-domains found by Validin Threat Intelligince Platform☆36Updated this week
- Use ExpressJS Middlewares as AWS Lambda handlers☆14Jan 8, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Setup scripts for HomeLab with Proxmox☆36Feb 23, 2026Updated last month
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- All of my goodies, if you'd like them.☆13Mar 9, 2021Updated 5 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Jul 18, 2024Updated last year
- ☆30Aug 29, 2022Updated 3 years ago
- Domain-Driven Design TypeScript☆14Jun 16, 2024Updated last year