openhunting-io / ohcti-threatexposure
Openhunting CTI - Threat Exposure Data Breach Account (Telegram)
☆25Updated last year
Alternatives and similar repositories for ohcti-threatexposure:
Users that are interested in ohcti-threatexposure are comparing it to the libraries listed below
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆45Updated this week
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆96Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆39Updated 2 years ago
- Powershell script to help Speed up Threat hunting incident response processes☆45Updated 11 months ago
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆110Updated 11 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆32Updated 7 months ago
- ☆78Updated 9 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆106Updated 2 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 7 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 10 months ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆50Updated 3 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆48Updated last month
- Ransomware groups posts☆35Updated this week
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆22Updated 9 months ago
- ☆105Updated 2 months ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- ☆24Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- ☆31Updated 9 months ago
- ☆27Updated this week
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆21Updated last month
- This is an AD pentest tools collection☆53Updated 6 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆38Updated 10 months ago
- Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure☆29Updated 11 months ago
- APK Infrastructure Investigator☆63Updated last year