optiv / OSINT_EncyclopediaLinks
Your go-to resource for all things OSINT
☆181Updated last year
Alternatives and similar repositories for OSINT_Encyclopedia
Users that are interested in OSINT_Encyclopedia are comparing it to the libraries listed below
Sorting:
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- ☆148Updated 2 years ago
- ☆65Updated 4 years ago
- Simple Python tool to check if there is an Office 365 instance linked to a domain.☆51Updated 4 years ago
- MayorSec DNS Enumeration Tool☆89Updated last year
- A WLAN red team framework.☆155Updated last year
- A repository with informtion related to Cloud Osint☆110Updated 9 months ago
- Uncover the full name of a target on Linkedin.☆163Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 4 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Slides for my conference talks☆46Updated 2 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆55Updated 2 years ago
- https://github.com/BC-SECURITY/Empire☆50Updated 3 years ago
- ☆34Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆130Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆155Updated 2 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- ☆17Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆45Updated 3 years ago