janhalendk / react
A OSINT project that explores how to dump data from React
☆24Updated last year
Alternatives and similar repositories for react:
Users that are interested in react are comparing it to the libraries listed below
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆40Updated last year
- Regular Expressions List used in Digital Forensic Tasks☆82Updated this week
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆76Updated this week
- Cyber Underground General Intelligence Requirements☆90Updated last year
- Case_Notes.py is a cross-platform (Windows, macOS, & Linux) python script to help make the documentation process easier.☆26Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆75Updated 3 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆47Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆104Updated last year
- Tool to build and export timelines☆32Updated 5 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 3 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last week
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆39Updated 11 months ago
- Data from Dark Web Marketplace scraping - Be careful☆38Updated 3 months ago
- The OSINT Field Manual☆108Updated last month
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆41Updated last year
- Some important DFIR Resources☆83Updated last year
- ☆139Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- Sniffing out well-known threat groups☆28Updated 6 months ago
- A series of python scripts to extract information from Dark Web Applications☆12Updated 3 months ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Updated 3 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 7 months ago
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆122Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆151Updated 9 months ago
- ☆132Updated last year
- God Mode Detection Rules☆134Updated 6 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆131Updated last year
- A list of books suggested by the security community to aid intelligence analysts learn to think☆28Updated last year