openhunting-io / ohcti-threatexposureView external linksLinks
Openhunting CTI - Threat Exposure Data Breach Account (Telegram)
☆68Dec 1, 2023Updated 2 years ago
Alternatives and similar repositories for ohcti-threatexposure
Users that are interested in ohcti-threatexposure are comparing it to the libraries listed below
Sorting:
- Identify QuasarRAT/AsyncRAT/DcRAT/VenomRAT servers through scanning☆13Apr 20, 2024Updated last year
- Extracting AsyncRAT configuration using CyberChef☆14May 4, 2022Updated 3 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- Tool for fuzzing HTTP and HTTPS requests to endpoints, and identify the rules and triggers of censorship devices.☆16Feb 4, 2024Updated 2 years ago
- Ghidra Script for automated analysis of EMOTET☆17Feb 3, 2021Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- Various snippets created during malware analysis☆22Apr 29, 2018Updated 7 years ago
- ☆21Apr 19, 2024Updated last year
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Open source tool for static analysis of malwares.☆29Jul 10, 2020Updated 5 years ago
- ☆12Jul 29, 2019Updated 6 years ago
- Extension functionality for the NightHawk operator client☆26Oct 31, 2023Updated 2 years ago
- macOS triage is a python script to collect various macOS logs, artifacts, and other data.☆25Mar 25, 2021Updated 4 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Dec 8, 2024Updated last year
- Various PowerShell scripts that may be useful during red team exercise☆21Apr 28, 2022Updated 3 years ago
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- Enhanced QDLink without handbreak detection and many other restrictions.☆10Apr 13, 2023Updated 2 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Sep 21, 2020Updated 5 years ago
- Web application designed to raise user awareness and fortify online identities against tracking techniques.☆39Jan 29, 2025Updated last year
- ☆35Jan 13, 2026Updated last month
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- ☆11Feb 28, 2022Updated 3 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- ☆34May 18, 2023Updated 2 years ago
- ☆34Nov 11, 2025Updated 3 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆144Jan 19, 2026Updated 3 weeks ago
- Layer 7 DDoS tool that supports sophisticated attack methods.☆26Jul 6, 2025Updated 7 months ago
- SCCP protocol implementation in pure Golang.☆40Jun 27, 2025Updated 7 months ago
- List of OSINT Repositories starred from GitHub (limited access version)☆63Feb 8, 2026Updated last week
- Track C2 servers, tools, and botnets over time by framework and location☆43Feb 9, 2025Updated last year
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Python3 script to dump breach data from Dehashed☆42Jun 30, 2025Updated 7 months ago
- SocksSharp provides support for Socks4/4a/5 proxy servers to HttpClient☆12Feb 3, 2021Updated 5 years ago