mr-r3b00t / crime-mapperView external linksLinks
A tool for mapping cyber crime
☆237Jan 24, 2026Updated 3 weeks ago
Alternatives and similar repositories for crime-mapper
Users that are interested in crime-mapper are comparing it to the libraries listed below
Sorting:
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- Modular web-application honeypot platform built using go and gin☆63May 8, 2024Updated last year
- Cross-platform username reconnaissance tool built for OSINT investigators, cyber threat analysts, red teamers, and CTF enthusiasts.☆121Aug 10, 2025Updated 6 months ago
- osint tool for dumping links containing trackers from each user on one or all discords☆71May 12, 2025Updated 9 months ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆17Mar 27, 2024Updated last year
- Tools and resources that may be useful to you when conducting investigations related to Islamic Republic of Iran☆18Sep 10, 2025Updated 5 months ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆518Jun 15, 2024Updated last year
- Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..☆27Oct 20, 2025Updated 3 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆457Oct 29, 2025Updated 3 months ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the Democratic People's Republic …☆35May 1, 2025Updated 9 months ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- Yet another machine learning-based WAF research☆26Jun 21, 2022Updated 3 years ago
- All-sources tool to search websites by favicons☆184Nov 9, 2024Updated last year
- DeepFace UI is a web application for facial recognition and analysis built with DeepFace. It offers an intuitive interface to upload imag…☆138Mar 27, 2025Updated 10 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- AppLocker Policy Generator☆25Aug 25, 2025Updated 5 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆37Aug 23, 2025Updated 5 months ago
- ☆761May 7, 2025Updated 9 months ago
- ☆39Mar 28, 2025Updated 10 months ago
- ☆31Feb 3, 2026Updated last week
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Jan 8, 2026Updated last month
- ☆102Dec 9, 2025Updated 2 months ago
- A Linkedin Activity date Finder☆65Apr 11, 2025Updated 10 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆92Jan 14, 2026Updated last month
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 3 months ago
- ☆51Nov 25, 2025Updated 2 months ago
- hashtray is an OSINT (Open Source Intelligence) tool designed to find a Gravatar account associated with an email address and to locate a…☆61Jan 11, 2026Updated last month
- collection of links related to using and improving windbg☆20Jun 17, 2018Updated 7 years ago
- This repository contains an IDA processor for loading and disassembling compiled yara rules.☆44Dec 31, 2024Updated last year
- Just for funsies, virtual foregrounds in Zoom conference calls☆18May 5, 2020Updated 5 years ago
- All in 1 phishing framework☆37Aug 20, 2022Updated 3 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- ☆23Dec 30, 2021Updated 4 years ago
- ☆23Mar 4, 2025Updated 11 months ago
- skytrack is a planespotting and aircraft OSINT tool made using Python 🛩🔍☆498Dec 19, 2023Updated 2 years ago
- A tool for extracting additional data from a person's personal identifiers☆43Nov 14, 2023Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago