jocephus / DECEPTICON_Bot
Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.
☆52Updated 4 years ago
Alternatives and similar repositories for DECEPTICON_Bot:
Users that are interested in DECEPTICON_Bot are comparing it to the libraries listed below
- A WikiLeaks scraper inspired by the Datasploit module previously written in Python2. This script leverages pandas and Python3.☆39Updated 8 months ago
- An intelligence tool for Venmo☆63Updated 2 years ago
- Your go-to resource for all things OSINT☆161Updated 10 months ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- an awesome list of active defense resources☆117Updated 4 years ago
- Curated list of awesome, open source data exfiltration tools☆58Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- Trace Labs - Search Party CTF Writeups☆91Updated 2 months ago
- Slides for my conference talks☆43Updated last year
- ☆138Updated last year
- ☆123Updated 3 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆173Updated 7 months ago
- OSINT VM based on Open Source Intelligence Techniques 7th Edition☆63Updated 4 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 2 years ago
- Let's obscure some IPv4 addresses☆36Updated 2 years ago
- ☆23Updated 4 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆28Updated 4 years ago
- Monitor geotagged social media from multiple platforms in real time.☆75Updated 6 years ago
- Maintained list of OSINT resources specifically for researching domains and IoT products.☆66Updated 3 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆73Updated 2 years ago
- Uncover the full name of a target on Linkedin.☆158Updated 2 years ago
- Files vetted, and approved for public release☆53Updated last year
- Startup project to create a simple to deploy honey pot style detection tool for alerting on common network attacks☆40Updated 4 years ago
- Identifies physical locations where a laptop has been based upon wireless profiles and wireless data recorded in event logs☆90Updated 3 years ago
- ☆20Updated 5 years ago
- For storing of the volumes☆4Updated 4 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆143Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago