oryon-osint / OSINT360-GPTView external linksLinks
OSINT GPT β Cyber Intelligence β Advanced AI assistant for OSINT, DFIR, ethical hacking, red teaming, privacy & compliance. π
β79Dec 12, 2025Updated 2 months ago
Alternatives and similar repositories for OSINT360-GPT
Users that are interested in OSINT360-GPT are comparing it to the libraries listed below
Sorting:
- Curated manuals, playbooks, and checklists for OSINT, OPSEC, cyber security, and digital investigationsβ121Sep 15, 2025Updated 4 months ago
- Herramienta de extracciΓ³n de exploits desde Shodan Exploits para facilitar la bΓΊsqueda de vulnerabilidades conocidas. πβ23Sep 20, 2025Updated 4 months ago
- TeleStrike is a red team utility designed for adversary simulation and security auditing of Telegram accounts. Built for educational and β¦β42Aug 1, 2025Updated 6 months ago
- Find tools that will help you with your OSINT investigations, from auditing, screen recording to aggregation. Add then to your OSINT Toolβ¦β50Jan 4, 2026Updated last month
- Querytool is an OSINT framework based on Google Spreadsheet. With this tool you can perform complex search of terms, people, email addresβ¦β312Feb 24, 2024Updated last year
- WiFi Geolocation Spoofing with the ESP8266β80May 17, 2018Updated 7 years ago
- Comunidade Brasileira de CiberseguranΓ§aβ22Oct 6, 2025Updated 4 months ago
- C2 DDOS, With Method SYN, ICMP, TCP, HTTP, UDP, DNS FLOOD, Slowloris, TLS.β28Jan 2, 2024Updated 2 years ago
- β43Feb 20, 2016Updated 9 years ago
- Project repository for "Evaluating the persuasive influence of political microtargeting with large language models" by Kobi Hackenburg anβ¦β11Jun 19, 2024Updated last year
- The eJPT is a practical penetration testing certification provided by elearnsecurity. Here you will find course notes and the cheat sheetβ¦β19Nov 3, 2025Updated 3 months ago
- Simple self-driving example for the Valohai platformβ10Feb 16, 2021Updated 4 years ago
- AutoFlowchart is a JavaFX program that allows you to automatically generate a flowchart out of your Java codeβ10Jan 15, 2022Updated 4 years ago
- MCP Servers en MΓ‘laga con saleroβ22Oct 28, 2025Updated 3 months ago
- Back end for producing indicators and loading them into the COVIDcast API.β12Dec 16, 2025Updated last month
- Mycroft is a Offline File Analyzer and Metadata Scraperβ26Jun 18, 2025Updated 7 months ago
- This plant leaf disease detection project was developed using Python, Flask, TensorFlow, and NumPy. The model was trained over 3000+ dataβ¦β10Jul 30, 2023Updated 2 years ago
- The repository of the hands-on introduction to machine learning workshop of the DataLearn 2019 track at DataHack 2019.β10Sep 1, 2019Updated 6 years ago
- A free Python source code editor and Notepad replacement for Windowsβ11Sep 17, 2021Updated 4 years ago
- This script is written in Solidity and Python3, it allows you to sell Honeypot tokens despite broken TransferFrom function.β12Jan 28, 2022Updated 4 years ago
- Connect Digital Persona Finger Print Device with Android ()β11Mar 26, 2024Updated last year
- AI-Powered CyberSecurity Compliance: Boost Network Security with OpenAI GPT-3.5-turboβ10May 18, 2023Updated 2 years ago
- Coeus π is an OSINT ToolBox empowering users with tools for effective intelligence gathering from open sources. From social media monitoβ¦β198Jan 10, 2025Updated last year
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!β11Aug 27, 2022Updated 3 years ago
- find an unconfirmed transaction you like and fire up my app. Input your Wallet address when prompted to and warch the tx be rerouted to yβ¦β12May 8, 2020Updated 5 years ago
- β14Jan 6, 2025Updated last year
- Script Android from TCP socketβ12May 13, 2022Updated 3 years ago
- A script to access someone's webcam by sharing a link.β10May 3, 2020Updated 5 years ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities π΅οΈββοΈ using Metasploit π. Learn how to idβ¦β13May 25, 2025Updated 8 months ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dirβ¦β14Jul 10, 2025Updated 7 months ago
- Android app that runs shell scripts as the root user on a rooted Android device.β15Feb 4, 2026Updated last week
- π± RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems suβ¦β15Apr 13, 2024Updated last year
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whonβ¦β11Jul 22, 2022Updated 3 years ago
- An AI model that finds its way by avoiding obstacles and finds the best way to reach from the top left of the screen to the down rightβ10Mar 12, 2022Updated 3 years ago
- Bitcoin address changer. It changes the clipboard depending of the pubkey.β10Sep 12, 2021Updated 4 years ago
- WireGuard client for PacketFence ZTNAβ11Apr 26, 2021Updated 4 years ago
- Attendance Management using Smart Contractβ12Nov 21, 2020Updated 5 years ago
- Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.β11Feb 5, 2024Updated 2 years ago
- Does FFT (Fast Fourier Transform) to the acceleration data that obtained from an android device.β10Dec 6, 2023Updated 2 years ago