An ongoing collection of awesome tools and frameworks, best security software practices, libraries, learning tutorials, frameworks, academic and practical resources about Open-source intelligence (OSINT) in cybersecurity.
☆36Jan 23, 2022Updated 4 years ago
Alternatives and similar repositories for cybersecurity-osint
Users that are interested in cybersecurity-osint are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of awesome telegram osint resources.☆15May 2, 2022Updated 4 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆20Feb 29, 2024Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Jun 14, 2023Updated 2 years ago
- Browser extension that I use daily to detect fake news; search images and collect data.☆11Nov 19, 2022Updated 3 years ago
- Ethical Hacking - Useful Resources☆20Apr 17, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Dec 16, 2021Updated 4 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆42Feb 24, 2023Updated 3 years ago
- A repo of useful CyberSec tools/urls, OSINT, Linux security resources, and more.☆28Dec 8, 2024Updated last year
- IP Tracker With Google Map Link☆15Jun 16, 2022Updated 3 years ago
- Republic of Korea (South Korea) specific OSINT source list☆16Mar 2, 2022Updated 4 years ago
- Stalker represents a sophisticated tool utilized in the realm of Open Source Intelligence (OSINT). Its primary function is to facilitate …☆15Nov 26, 2023Updated 2 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆13Jan 3, 2018Updated 8 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about iOS Security…☆25Jan 6, 2024Updated 2 years ago
- An ongoing collection of awesome macOS and iOS security tools, software, libraries, learning tutorials, frameworks, academic and practica…☆37Dec 31, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An ongoing collection of awesome software, API libraries, checlists, best guidelines and resources and most important security countermea…☆14Nov 15, 2022Updated 3 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆14Feb 4, 2022Updated 4 years ago
- Vulnerability Assessment and Penetration Testing Tools (Information Security / Cyber security)☆31Oct 26, 2022Updated 3 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines and technical resou…☆14Apr 9, 2022Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jan 12, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆11Mar 25, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- Phishing attack identification tool - Performs email risk evaluations relying on different black lists, machine learning techniques, and …☆18Feb 27, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Oxomium is a cybersecurity gouvernance and conformity (GRC) tool for CISCO and SECOPS. By linking framework requirements, controld schedu…☆18Apr 22, 2026Updated 2 weeks ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆48Nov 11, 2022Updated 3 years ago
- ☆14Jan 2, 2024Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆69Jul 25, 2025Updated 9 months ago
- it's a small program written in rust with only the standard library to analyze the headers of an elf64 file☆13May 23, 2024Updated last year
- A collection of CTF frameworks, libraries, resources, softwares and tutorials, books, resources and cool stuff in Cybersecurity☆17Dec 11, 2021Updated 4 years ago
- this is a small pe64 file analyzer in c++ with winapi, I didn't do it in the best way but hey, it's a small project like that that I tho…☆14Jan 1, 2025Updated last year
- GoLang script that checks for password leaks by sending email address to the BreachDirectory API☆12Nov 3, 2021Updated 4 years ago
- CI/CD pipelines are critical touchpoints in modern software development where code-level vulnerabilities, container security, and vulnera…☆23Apr 28, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- An ongoing & curated collection of awesome AuthN+Z software, libraries and frameworks, best guidelines and technical resources and cool s…☆18Dec 13, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆59Jan 16, 2023Updated 3 years ago
- Python Tools for USB Hacking☆18Oct 31, 2020Updated 5 years ago
- Manage and access your Kali Linux or Parrot Security VM from the terminal (SSH support + file sharing, especially convenient during CTFs,…☆20Apr 25, 2026Updated 2 weeks ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 4 years ago
- Enumerate typosquatting, IDN homograph, bitsquatting, and visual spoofing candidates for red team engagements, threat hunting, and brand …☆11Mar 28, 2026Updated last month
- Ansible playbook for setting up a secure and private homelab with multiple machines, following ansible-lint best practices and implementi…☆14Jun 16, 2025Updated 10 months ago