OSINT GPT ⌁ Cyber Intelligence – Advanced AI assistant for OSINT, DFIR, ethical hacking, red teaming, privacy & compliance. 🚀
☆101Dec 12, 2025Updated 5 months ago
Alternatives and similar repositories for OSINT360-GPT
Users that are interested in OSINT360-GPT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Curated manuals, playbooks, and checklists for OSINT, OPSEC, cyber security, and digital investigations☆127Sep 15, 2025Updated 8 months ago
- TeleStrike is a red team utility designed for adversary simulation and security auditing of Telegram accounts. Built for educational and …☆43Aug 1, 2025Updated 9 months ago
- ☆24Jun 28, 2025Updated 10 months ago
- C2 DDOS, With Method SYN, ICMP, TCP, HTTP, UDP, DNS FLOOD, Slowloris, TLS.☆31Jan 2, 2024Updated 2 years ago
- Information Gathering & WebSite ReConnaissance.☆24Feb 8, 2018Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- VulScanner - is a powerful, multi-faceted tool designed for security professionals, developers, and penetration testers to perform automa…☆39Jul 29, 2025Updated 9 months ago
- Mycroft is a Offline File Analyzer and Metadata Scraper☆30Feb 21, 2026Updated 2 months ago
- A comprehensive WiFi penetration testing framework for security professionals☆17Jul 18, 2025Updated 10 months ago
- WiFi Geolocation Spoofing with the ESP8266☆79May 17, 2018Updated 8 years ago
- Find tools that will help you with your OSINT investigations, from auditing, screen recording to aggregation. Add then to your OSINT Tool…☆52Apr 5, 2026Updated last month
- OWASP Foundation Web Respository☆20Mar 15, 2021Updated 5 years ago
- Antiforensic actions to secure your device if it's physically stolen from you☆14Jan 22, 2023Updated 3 years ago
- Comunidade Brasileira de Cibersegurança☆27Oct 6, 2025Updated 7 months ago
- the leaked prompts from the best performing gpts☆18Feb 23, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Dec 8, 2024Updated last year
- Automated Mass Exploiter☆11Apr 14, 2019Updated 7 years ago
- Big Dorker☆14Oct 18, 2024Updated last year
- Bulk email validation. Deploy on server with Redis or as serverless webapp with AWS.☆13Jun 16, 2019Updated 6 years ago
- Offensive Security & Red Teaming Labs and Projects☆27Aug 26, 2025Updated 8 months ago
- MCP Servers en Málaga con salero☆22Oct 28, 2025Updated 6 months ago
- DoS Attacks on Bluetooth Devices for pentest purposes☆35Nov 22, 2025Updated 5 months ago
- ToolShell scanner - CVE-2025-53770 and detection information☆19Dec 7, 2025Updated 5 months ago
- Squid SSL Proxy with SSL Bump for intercepting SSL traffic☆11Sep 10, 2025Updated 8 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Project repository for "Evaluating the persuasive influence of political microtargeting with large language models" by Kobi Hackenburg an…☆11Jun 19, 2024Updated last year
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 11 months ago
- Dorkscanner Tools☆10Dec 20, 2022Updated 3 years ago
- Advanced Threat Hunting: Ransomware Group☆28Jul 9, 2025Updated 10 months ago
- A curated collection of tools, bots, and resources for Open Source Intelligence (OSINT) investigations on Telegram. Includes chat analysi…☆61Oct 5, 2025Updated 7 months ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- Django middleware and signals for handling security events☆14Apr 14, 2021Updated 5 years ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆17Jul 10, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Download images from URLs within a CSV☆13Jan 6, 2021Updated 5 years ago
- DarkGPT is an OSINT assistant based on GPT-4-200K (recommended use) designed to perform queries on leaked databases, thus providing an ar…☆183Mar 12, 2024Updated 2 years ago
- Ansible role to build an Onion Pi Tor proxy with a Raspberry Pi 4 Model 4 B☆11Dec 12, 2021Updated 4 years ago
- WAFHUNTER is a Python script designed to detect Web Application Firewalls (WAFs) on websites. It uses a comprehensive list of WAF signatu…☆60Jan 29, 2026Updated 3 months ago
- ☆22Apr 14, 2026Updated last month
- Checklist of simple and not so simple things to enhance your OPSEC.☆20Jul 24, 2018Updated 7 years ago
- Flash Bitcoin Sender is a software designed to enable you send fake Bitcoin from any wallet address to another wallet address on the bloc…☆12Sep 13, 2022Updated 3 years ago