A OSINT project that explores how to dump data from React
☆80Sep 16, 2025Updated 5 months ago
Alternatives and similar repositories for react
Users that are interested in react are comparing it to the libraries listed below
Sorting:
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- SMSBOX is a tool to send anonymous messages. This script uses the Textbelt API to work, Textbelt is an API that allows us to send a singl…☆17Jul 1, 2025Updated 8 months ago
- Open source code for use with Hunchly.☆10May 28, 2018Updated 7 years ago
- A resource full of Crypto/OSINT tools, techniques and training courses for CTI, AML, and forensic investigations.☆119Dec 23, 2025Updated 2 months ago
- BlackMail is a tool for creating and sending spoof mail.☆37Nov 16, 2023Updated 2 years ago
- Custom Search Engines for OSINT☆142Sep 16, 2025Updated 5 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- Reads and prints information from the website MalAPI.io☆39Jan 18, 2022Updated 4 years ago
- A basic web implementation of Holehe☆23Apr 8, 2025Updated 10 months ago
- Remote DLL Injection with Timer-based Shellcode Execution☆154Jul 18, 2025Updated 7 months ago
- Listing of official dojos☆23Nov 7, 2025Updated 3 months ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated 11 months ago
- A GitHub Actions Supply Chain CTF / Goat☆27Jan 6, 2026Updated last month
- Osint-kit is a curated collection of tools for OSINT investigations, from auditing and screen recording to aggregation. Build your ultima…☆160Dec 11, 2025Updated 2 months ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆55Sep 24, 2025Updated 5 months ago
- Camera phishing screen (to take photos from the front and rear cameras)☆63Nov 20, 2025Updated 3 months ago
- IOCs and notes related to malware☆27Jul 7, 2025Updated 7 months ago
- OWASP Foundation web repository☆57Updated this week
- Custom templates for OSINT investigations designed to advance pivoting.☆165Jul 22, 2024Updated last year
- Public OSINT Tools from My OSINT Training☆35Feb 19, 2026Updated 2 weeks ago
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- ☆58Dec 10, 2025Updated 2 months ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- Chrome Extensions for OSINT☆176Oct 29, 2025Updated 4 months ago
- Static Encrypt is an crate that encrypts string literals at compile time and only decrypted at runtime when needed.☆57Jan 17, 2026Updated last month
- open source software for journalists to investigate all of the data in the BlueLeaks dataset☆33Updated this week
- An exercise to practice deobfuscating PowerShell Scripts.☆26Feb 10, 2023Updated 3 years ago
- In this repository you will find sample commands and test files for each day of the course "Linux for OSINT. A 21-day course for beginner…☆578Jan 6, 2026Updated last month
- Capture screenshots of onion services on an onion service.☆73Jun 11, 2024Updated last year
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆82Apr 12, 2025Updated 10 months ago
- A robust Python-based OSINT tool designed for validating and investigating email addresses across social media platforms and known data b…☆62Aug 6, 2025Updated 6 months ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- OSINT Timeline Weekly Newsletter with collection of tools, services and investigations☆134Updated this week
- A lightweight Command and Control (C2) framework built for offensive security research and red teaming (Post Exploitation).☆68Dec 17, 2025Updated 2 months ago
- A basic AIX enumeration guide for penetration testers/red teamers☆32Apr 11, 2017Updated 8 years ago