jaegeral / awesome-cyber-civil-society-actors
A curated lust of awesome cyber civil society actors, project etc.
☆10Updated 4 years ago
Related projects: ⓘ
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- Python bindings for Yeti's API☆18Updated last year
- My personal experience in Threat Hunting and knowledge gained so far.☆18Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- Passive recon / OSINT automation script☆40Updated 5 years ago
- ☆14Updated this week
- A transform to show the latest copy of the website from the Wayback Machine☆15Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆27Updated 4 years ago
- ☆18Updated this week
- Performs OCR on image files and scans them for matches to YARA rules☆39Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Collect hashes password hashes for cracking☆30Updated 10 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆40Updated 4 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 7 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 4 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- ☆14Updated 6 years ago
- Parses Java Cache IDX files☆39Updated 6 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆17Updated 10 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 8 years ago