A platform for hreat intelligence & brand monitoring, dark web intelligence, osint, and more.
☆107Mar 15, 2026Updated last week
Alternatives and similar repositories for threatintel-platform
Users that are interested in threatintel-platform are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 4 years ago
- A cleaned up Go version of TxtElite☆10Nov 14, 2022Updated 3 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- A simple crawler written in Kotlin☆10Jul 24, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bash-based recon automation script that orchestrates tools like Nmap, Dirsearch (Python), and crt.sh to perform port scanning, directory …☆15Jul 22, 2025Updated 8 months ago
- Burp Bounty Lab provides a safe, local target to validate that your Burp Bounty Pro scanner profiles detect vulnerabilities correctly. It…☆40Mar 16, 2026Updated last week
- DEFCON 33 Workshop - Open Source Malware 101 - Everything you always wanted to know about npm malware (and more)☆15Aug 8, 2025Updated 7 months ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆48Jan 10, 2022Updated 4 years ago
- RNNs for sql-injection detection 🔍. built in python with tensorflow and keras☆12Sep 14, 2024Updated last year
- python3 version of cloacked-pixel.☆11Oct 8, 2022Updated 3 years ago
- 🎥 Brickcom Private Security Cam's Scan and Exploit Improper view DataBase 📺 Watching priv8 (records 📼) in real time from almost countr…☆21Jan 16, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tool for fetching all the available waybackmachine snapshot urls☆24Oct 8, 2024Updated last year
- ☆22Apr 24, 2023Updated 2 years ago
- ☆18Feb 17, 2025Updated last year
- MalwareScan is a lightweight and fast malware scanner written in Python. It supports both Windows and Linux platforms and provides an ope…☆13Jun 2, 2025Updated 9 months ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆40Oct 24, 2025Updated 5 months ago
- A basic Bug Bounty target monitoring tool based on Discord Bot☆23Jan 30, 2025Updated last year
- Detection of rootkit file hiding activities through analysis of shifts in kernel function execution times.☆29Sep 10, 2025Updated 6 months ago
- Little-Psycho has a focus on destructive and stress testing of both software and hardware and also included the overclocking and health t…☆23Apr 5, 2024Updated last year
- Lite version of my Gatekeeper backdoor for public use.☆52Nov 15, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆17Dec 23, 2024Updated last year
- Elastic Security Labs' malware analysis and reverse engineering library☆53Mar 10, 2026Updated 2 weeks ago
- 针对windows rootkit的一些检测,分别从进程、端口、文件这三个方面进行检测。☆21Jan 16, 2025Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- Source code for 'Python for Teenagers' by James R Payne☆13Apr 3, 2020Updated 5 years ago
- TUI file explorer based on PowerShell and fzf☆10Aug 4, 2025Updated 7 months ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 用于若依和Jeecg数据库中密码的爆破☆23Jul 19, 2025Updated 8 months ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- I have documented all of the AMSI patches that I learned till now☆73Nov 4, 2025Updated 4 months ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Aug 9, 2024Updated last year
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- ☆16Dec 7, 2025Updated 3 months ago