openhunting-io / ohcti-threatexposure
Openhunting CTI - Threat Exposure Data Breach Account (Telegram)
☆26Updated last year
Alternatives and similar repositories for ohcti-threatexposure:
Users that are interested in ohcti-threatexposure are comparing it to the libraries listed below
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆47Updated this week
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last week
- Just my findings of malwares☆43Updated 2 years ago
- Tools used for Pentesting☆22Updated last year
- A Red Teaming tool focused on profiling the target.☆26Updated 8 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 7 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- Repo for all my exploits/PoCs☆43Updated this week
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 4 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆32Updated 8 months ago
- ☆18Updated last year
- Ransomware groups posts☆38Updated this week
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆97Updated last year
- ☆29Updated this week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Ransomware Simulator for testing Blue Team Detections☆37Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- Red Team Server (RTS)☆16Updated 11 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated last year
- ☆34Updated last month
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- C2 Active Scanner☆52Updated 8 months ago
- ☆32Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 8 months ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- IOCs collected during day-to-day activities☆27Updated this week
- A small executable to trick a user to authenticate using code matching MFA☆68Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 11 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆114Updated last year