Openhunting CTI - Threat Exposure Data Breach Account (Telegram)
☆71Dec 1, 2023Updated 2 years ago
Alternatives and similar repositories for ohcti-threatexposure
Users that are interested in ohcti-threatexposure are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆30Jul 21, 2025Updated 9 months ago
- The Dictionary service provides access to the data dictionary and edge dictionary. These services provide metadata about fields that are …☆24Mar 11, 2025Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Bookmarklets created for OSINT applications☆23Oct 24, 2023Updated 2 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automated GitHub secret scanning with smart alerting & monitoring.☆31Jan 15, 2026Updated 3 months ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Feb 4, 2024Updated 2 years ago
- Backdooring Claude Code via hooks in settings.json. Authorized use only!☆71Apr 16, 2026Updated 2 weeks ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Find tools that will help you with your OSINT investigations, from auditing, screen recording to aggregation. Add then to your OSINT Tool…☆52Apr 5, 2026Updated last month
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆49Sep 23, 2025Updated 7 months ago
- A python3 script searching for secret on swaggerhub☆66Mar 22, 2022Updated 4 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Dec 8, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- SpecOps is a Burp Suite extension that ingests an OpenAPI or Swagger spec and instantly builds a workbench to test every documented endpo…☆32Mar 27, 2026Updated last month
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 8 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the United States of America. Thi…☆25Sep 9, 2025Updated 7 months ago
- ☆21Apr 19, 2024Updated 2 years ago
- Real-time and historical 3D visualization of ADS-B aircraft data with 7 visual themes, mini radar, and interactive controls☆29Mar 15, 2026Updated last month
- Pentesting tool to automate common op tasks and organize discovered data.☆14Mar 26, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated last year
- PoCs of RCEs against open source C2 servers☆92Sep 28, 2024Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- This repository is dedicated to providing comprehensive mappings of the OWASP Top 10 vulnerabilities for Large Language Models (LLMs) to …☆39Feb 15, 2024Updated 2 years ago
- A tool for searching common variations of a human name☆50Dec 13, 2025Updated 4 months ago
- ☆23Jul 7, 2023Updated 2 years ago
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Jul 19, 2020Updated 5 years ago
- A dynamic, Flask-based web application providing a centralized interface for executing various open-source intelligence (OSINT) and cyber…☆42Apr 25, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆33Jan 1, 2020Updated 6 years ago
- A language model in your terminal☆20Apr 5, 2026Updated last month
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Various PowerShell scripts that may be useful during red team exercise☆21Apr 28, 2022Updated 4 years ago
- macOS triage is a python script to collect various macOS logs, artifacts, and other data.☆26Mar 25, 2021Updated 5 years ago
- ☆14Nov 8, 2024Updated last year
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Apr 23, 2023Updated 3 years ago