An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and groups.
☆106Apr 21, 2024Updated last year
Alternatives and similar repositories for Telegram-OSINT-for-Cyber-Threat-Intelligence-Analysis
Users that are interested in Telegram-OSINT-for-Cyber-Threat-Intelligence-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A high-performance Go-based tool for checking the availability and responsiveness of domains, utilizing both HTTP requests and browser au…☆92Nov 26, 2024Updated last year
- Linux-based botnet builder designed for creating advanced botnet payloads.☆106Nov 2, 2025Updated 4 months ago
- OsintIA_Tools.py is an automated tool for collecting and analyzing public information that combines OSINT techniques with artificial inte…☆62Mar 11, 2025Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- This tool can retrieve : 1.Deleted tweets and replies ,Even if The account is suspended 2 .Old bios and Timestamp of The tweets☆264Feb 21, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- PoC analyzer of your email address exposure on various services☆65Oct 9, 2023Updated 2 years ago
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆335Feb 17, 2023Updated 3 years ago
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- Generate a QR code with your wifi credentials☆66Oct 19, 2024Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Nov 12, 2023Updated 2 years ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Dec 29, 2024Updated last year
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆15May 3, 2024Updated last year
- A Simple JS code to keylogger data and send it to the personal server☆31Dec 30, 2024Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆132Mar 26, 2025Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Oct 9, 2024Updated last year
- Web app tool for helping compose advance search operators (aka Google dorking AKA boolean searches) for a variety of search engines☆35May 9, 2023Updated 2 years ago
- A small red team course☆40Jun 6, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆244Jul 31, 2024Updated last year
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Nov 22, 2024Updated last year
- Improve you Geolocation skills, with this ilist of resources.☆301Dec 31, 2025Updated 2 months ago
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆36Nov 5, 2024Updated last year
- Multi-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart☆44Jun 17, 2018Updated 7 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Jan 29, 2024Updated 2 years ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆154Aug 4, 2025Updated 7 months ago
- In-Memory Rootkit For Linux and BSD☆87Aug 9, 2025Updated 7 months ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- Step-by-step guide to building a custom machine for OSINT activities. The Basic Package includes a robust LINUX system strengthening proc…☆129Feb 22, 2024Updated 2 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- Methodology, links, tools for OSINT in different countries☆801Updated this week
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection☆301Nov 29, 2024Updated last year
- Manifest V3 web extension for dynamic user specified actions☆15Dec 11, 2023Updated 2 years ago