r-cybersecurity / list-of-security-resources-for-ukraine
List of companies or individuals offering cybersecurity services, data, or other tangible assets to assist in Ukraine's defense of its independence.
☆67Updated 3 years ago
Alternatives and similar repositories for list-of-security-resources-for-ukraine:
Users that are interested in list-of-security-resources-for-ukraine are comparing it to the libraries listed below
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆26Updated 4 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated last year
- ☆38Updated 2 years ago
- A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆39Updated last week
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆44Updated last year
- Integrated web scraper and email account data breach comparison tool☆79Updated 9 months ago
- ☆42Updated 2 weeks ago
- Machine learning face recognition combined with a drone and osint tools☆46Updated 4 years ago
- A collection of handy and specific tools for the Red Teamer☆11Updated 8 months ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆47Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- A curated list of Awesome Threat Intelligence resources☆47Updated 6 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Slides for my conference talks☆43Updated last year
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Uncover the full name of a target on Linkedin.☆162Updated 2 years ago
- Orca - Targeted OSINT Framework☆90Updated last year
- Simple Python tool to check if there is an Office 365 instance linked to a domain.☆52Updated 3 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- URL fingerprinting made easy☆86Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆56Updated 3 months ago
- This script will automatically set up an OSINT workstation starting from a Ubuntu OS.☆145Updated 2 years ago
- Gotanda is browser Web Extension for OSINT.☆186Updated last year
- Mobile camera-based application that attempts to alter photos to preserve their utility to humans while making them unusable for facial r…☆34Updated 2 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- Gather information from an email address connected to Office 365☆85Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆45Updated 3 years ago