optiv / OSINT_EncyclopediaLinks
Your go-to resource for all things OSINT
☆181Updated last year
Alternatives and similar repositories for OSINT_Encyclopedia
Users that are interested in OSINT_Encyclopedia are comparing it to the libraries listed below
Sorting:
- A WLAN red team framework.☆154Updated last year
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Slides for my conference talks☆44Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- ☆149Updated 2 years ago
- A repository with informtion related to Cloud Osint☆108Updated 6 months ago
- Simple Python tool to check if there is an Office 365 instance linked to a domain.☆54Updated 3 years ago
- MayorSec DNS Enumeration Tool☆89Updated 10 months ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Create visualization from Shodan query☆75Updated 4 years ago
- ☆65Updated 4 years ago
- Uncover the full name of a target on Linkedin.☆162Updated 3 years ago
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆51Updated last year
- Red Team tools, infrastructure, and hardware weaponized☆107Updated 2 weeks ago
- ☆34Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆78Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆150Updated 2 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆63Updated 4 years ago
- A curation of tools presented at DEF CON conference each year, the world's largest hacker con.☆40Updated last month
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago