Openhunting CTI - Threat Exposure Data Breach Account (Telegram)
☆68Dec 1, 2023Updated 2 years ago
Alternatives and similar repositories for ohcti-threatexposure
Users that are interested in ohcti-threatexposure are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 6 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆29Jul 21, 2025Updated 8 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Open-source stealer logs parser and visualization dashboard that structures and presents log data to facilitate analysis.☆79Updated this week
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- Automated GitHub secret scanning with smart alerting & monitoring.☆30Jan 15, 2026Updated 2 months ago
- A cyber security toolkit blending manual testing with AI Agents☆121Apr 7, 2026Updated last week
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Feb 4, 2024Updated 2 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆16Jan 7, 2023Updated 3 years ago
- Find tools that will help you with your OSINT investigations, from auditing, screen recording to aggregation. Add then to your OSINT Tool…☆52Apr 5, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Run Python on the Flipper Zero☆16Mar 28, 2024Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Mar 22, 2022Updated 4 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Dec 8, 2024Updated last year
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- ☆25Feb 10, 2026Updated 2 months ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆17Jan 9, 2025Updated last year
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the United States of America. Thi…☆24Sep 9, 2025Updated 7 months ago
- ☆21Apr 19, 2024Updated last year
- Real-time and historical 3D visualization of ADS-B aircraft data with 7 visual themes, mini radar, and interactive controls☆28Mar 15, 2026Updated 3 weeks ago
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 26, 2026Updated 2 weeks ago
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated last year
- ☆11Apr 18, 2018Updated 7 years ago
- ATLAS (All The Locations of All Servers) - Global data center mapping project with 6,266+ verified locations across 155 countries. Com…☆47Oct 13, 2025Updated 6 months ago
- PoCs of RCEs against open source C2 servers☆92Sep 28, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- sturdy-chainsaw☆70Aug 10, 2023Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Github action for monitoring CVE☆43Updated this week
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- r2con CTFD themes☆15Dec 23, 2021Updated 4 years ago
- PathShield is an anti-tracking tool for M5StickC Plus v1/2 that uses BLE & WiFI scanning to detect and alert you to devices following you…☆45Jan 19, 2026Updated 2 months ago
- ☆10Sep 6, 2023Updated 2 years ago