Twintelligence is a free Twitter OSINT tool
☆51Dec 8, 2020Updated 5 years ago
Alternatives and similar repositories for Twintelligence
Users that are interested in Twintelligence are comparing it to the libraries listed below
Sorting:
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- Scripts to automate Open Source Intelligence (OSINT)☆15Mar 27, 2019Updated 6 years ago
- ☆37May 21, 2014Updated 11 years ago
- Carbon Black - LastLine Binary Detonation Connector☆11May 22, 2023Updated 2 years ago
- [WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)☆13Jun 12, 2017Updated 8 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆48Apr 26, 2021Updated 4 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- ☆17Apr 13, 2018Updated 7 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- ☆63Jan 15, 2016Updated 10 years ago
- Script to enabled DNS Debug Logging across Domain Controllers in a Forest and then retrieve for analysis☆14May 27, 2016Updated 9 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Sep 20, 2021Updated 4 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- A phone CNAM lookup utility using the OpenCNAM API☆12Aug 15, 2014Updated 11 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆13Aug 9, 2016Updated 9 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- CTF writeups for the CTFs and Vulnerable Boxes I play with sometimes☆11Apr 20, 2017Updated 8 years ago
- This web application built using Django can be used to read and view pcap files on servers using a web browser☆11May 15, 2017Updated 8 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Attacks against weak 802.11 Random Number Generators☆25Feb 8, 2017Updated 9 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Dec 30, 2013Updated 12 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- Passive recon / OSINT automation script☆39Nov 3, 2018Updated 7 years ago
- Cyber Threat Intelligence Feeds☆98Sep 26, 2016Updated 9 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 9 years ago
- Websocket based egress tester☆20Nov 23, 2016Updated 9 years ago
- tamper resistant audit log☆17Aug 30, 2018Updated 7 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- A gadget finder and a ROP-Chainer tool for x86 platforms☆95Jun 13, 2021Updated 4 years ago
- Python Chat Statistics. Generates web pages and stats based on your (or your IRC bot's) IRC logs. Easily scheduled!☆12Oct 9, 2015Updated 10 years ago