jocephus / DECEPTICON_Bot
Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.
☆52Updated 4 years ago
Alternatives and similar repositories for DECEPTICON_Bot:
Users that are interested in DECEPTICON_Bot are comparing it to the libraries listed below
- An intelligence tool for Venmo☆64Updated 2 years ago
- A WikiLeaks scraper inspired by the Datasploit module previously written in Python2. This script leverages pandas and Python3.☆40Updated 9 months ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- Your go-to resource for all things OSINT☆165Updated last year
- an awesome list of active defense resources☆118Updated 4 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 2 years ago
- For storing of the volumes☆4Updated 5 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- Trace Labs - Search Party CTF Writeups☆92Updated 4 months ago
- Gather Open-Source Intelligence using PowerShell.☆170Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- The FASTEST way to consume threat intel.☆68Updated last year
- ☆35Updated 3 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆15Updated last month
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- Slides for my conference talks☆43Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- ☆141Updated last year
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆143Updated 2 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- ☆126Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆26Updated last week
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆173Updated 9 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 2 months ago
- ☆20Updated 5 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆43Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year