janhalendk / react
A OSINT project that explores how to dump data from React
☆21Updated 7 months ago
Related projects: ⓘ
- Cyber Underground General Intelligence Requirements☆85Updated 7 months ago
- Case_Notes.py is a cross-platform (Windows, macOS, & Linux) python script to help make the documentation process easier.☆24Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆89Updated last year
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆40Updated 11 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆68Updated last week
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- Regular Expressions List used in Digital Forensic Tasks☆74Updated 7 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆108Updated 5 months ago
- ☆17Updated this week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆113Updated 9 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆35Updated 10 months ago
- TRACE is a digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆91Updated 2 weeks ago
- Tool to build and export timelines☆30Updated 3 weeks ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆40Updated this week
- ☆23Updated this week
- Some important DFIR Resources☆81Updated last year
- The OSINT Field Manual☆97Updated 3 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆68Updated 9 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆38Updated 8 months ago
- Intelligence Architecture Mind Map☆110Updated 6 months ago
- God Mode Detection Rules☆130Updated last month
- ☆19Updated last month
- Linux Baseline and Forensic Triage Tool - BETA☆51Updated 2 years ago
- Defcon Arsenal Tools (DArT) is a curation of tools presented at DEF CON, the world's largest hacker con.☆25Updated 10 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆100Updated last year
- Hands-on cybersecurity projects to enhance skills in phishing investigation, malware analysis, network intrusion detection, and DDoS atta…☆76Updated 3 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆113Updated 11 months ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆34Updated 7 months ago
- A list of books suggested by the security community to aid intelligence analysts learn to think☆24Updated last year