optiv / OSINT_Encyclopedia
Your go-to resource for all things OSINT
☆165Updated last year
Alternatives and similar repositories for OSINT_Encyclopedia:
Users that are interested in OSINT_Encyclopedia are comparing it to the libraries listed below
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- Uncover the full name of a target on Linkedin.☆161Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated last year
- ☆141Updated last year
- A repository with informtion related to Cloud Osint☆88Updated 2 months ago
- Slides for my conference talks☆43Updated last year
- msImpersonate - User account impersonation written in pure Python3☆107Updated 2 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆43Updated last year
- Malware vulnerability intel tool for third-party attackers☆115Updated 5 months ago
- Create visualization from Shodan query☆72Updated 3 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆101Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- Browser extension that extracts users from LinkedIn company pages☆157Updated last year
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆40Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆124Updated last year
- MayorSec DNS Enumeration Tool☆85Updated 3 months ago
- ☆65Updated 3 years ago
- Simple Python tool to check if there is an Office 365 instance linked to a domain.☆52Updated 3 years ago
- A WLAN red team framework.☆151Updated 5 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- This repo is where I store my Threat Hunting ideas/content☆87Updated last year
- ☆63Updated 3 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆119Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- ☆34Updated last year
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆52Updated 4 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated last year