micahflee / blueleaks-explorer
open source software for journalists to investigate all of the data in the BlueLeaks dataset
☆22Updated this week
Alternatives and similar repositories for blueleaks-explorer
Users that are interested in blueleaks-explorer are comparing it to the libraries listed below
Sorting:
- AMI is a web application that helps people to create legal requests for copies of their personal information from data operators.☆30Updated 5 years ago
- A PoC backdoor that uses Gmail as a C&C server☆14Updated 4 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last month
- Index and collection of MVT compatibile indicators of compromise.☆82Updated 5 months ago
- A collection of handy Google Apps Script code snippets☆28Updated 2 years ago
- The open ransomware payment tracker☆94Updated 6 months ago
- Maltego local and server integration for OpenCTI☆31Updated 9 months ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Updated last month
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated 10 months ago
- Public API client for GETTR, a "non-bias [sic] social network," designed for data archival and analysis.☆13Updated 2 years ago
- Maltego transforms for Hunchly☆17Updated last year
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆14Updated 3 months ago
- ☆15Updated 3 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆32Updated last year
- Falcon Integration Gateway (FIG)☆18Updated 2 weeks ago
- This database tracks details about victims of NSO Group’s Pegasus spyware, based on reporting by Amnesty International, Citizen Lab, Forb…☆30Updated last year
- ☆67Updated 5 years ago
- ☆18Updated 6 months ago
- Useful commands for infosec☆29Updated 2 years ago
- Scripts to deploy and update MISP in air-gapped environments☆17Updated 2 months ago
- A curated list of resources related to Industrial Control System (ICS) security.☆32Updated 8 years ago
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆65Updated last week
- Import CrowdStrike Threat Intelligence into your instance of MISP☆46Updated 2 months ago
- Collection of videos of Raids on Cybercriminals☆19Updated last month
- AIL project training materials☆29Updated 3 months ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆26Updated 4 years ago
- ☆17Updated 5 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated 2 months ago