Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still need to investigate further, especially when their bosses request it. These threat feeds often refer to sources using terms like "hacker forum" or "underground forum" without specifying names.
☆12Sep 18, 2025Updated 6 months ago
Alternatives and similar repositories for What_is_this_forum
Users that are interested in What_is_this_forum are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆59Sep 18, 2025Updated 6 months ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated last week
- A static file containing a list of popular RSS feeds.☆13Aug 25, 2016Updated 9 years ago
- A Python script and executable for simulating the GPS location of an iOS 17 device connected to your computer using pymobiledevice3. Prov…☆12Jan 10, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Translate srt subtitles through Google Translation API☆16Apr 20, 2018Updated 7 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- ☆25Feb 8, 2026Updated last month
- Script for deploying CTF tools (Linux) tested on Kali 2☆12Feb 15, 2021Updated 5 years ago
- Use RError instead of Error in Node.js and the browser. It provides nested information about the cause of failure without significant imp…☆14Sep 24, 2024Updated last year
- reveal origins behind reverse proxies & hidden services☆37Aug 23, 2025Updated 7 months ago
- Go fast from target Facebook profile to target's Marketplace account☆36May 7, 2023Updated 2 years ago
- Game programming samples and techniques☆24Apr 4, 2024Updated last year
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- DIY security toolset for Cisco's Packet Tracer (version7.2)☆15Aug 17, 2021Updated 4 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 8 months ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- Yara scan Phishing Kit's Zip archive(s)☆61Jun 20, 2025Updated 9 months ago
- Some Cheat Sheet for Red Team☆18Dec 30, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated last year
- Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.☆12Jun 22, 2022Updated 3 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Feb 26, 2026Updated last month
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆35Updated this week
- Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models☆35Jan 14, 2025Updated last year
- 📦 Typescriot react perttier example using parcel bundler☆15Mar 7, 2018Updated 8 years ago
- Feed of phish-domains found by Validin Threat Intelligince Platform☆36Updated this week
- Use ExpressJS Middlewares as AWS Lambda handlers☆14Jan 8, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Setup scripts for HomeLab with Proxmox☆33Feb 23, 2026Updated last month
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- All of my goodies, if you'd like them.☆13Mar 9, 2021Updated 5 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Jul 18, 2024Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- ☆30Aug 29, 2022Updated 3 years ago
- Domain-Driven Design TypeScript☆14Jun 16, 2024Updated last year