rmceoin / gmalvertisingLinks
Hacked up scripts to perform google searches
☆16Updated last year
Alternatives and similar repositories for gmalvertising
Users that are interested in gmalvertising are comparing it to the libraries listed below
Sorting:
- C2 Active Scanner☆59Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆30Updated 2 months ago
- A home for detection content developed by the delivr.to team☆69Updated 3 weeks ago
- Cyber Underground General Intelligence Requirements☆93Updated last year
- The core backend server handling API requests and task management☆42Updated this week
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆44Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 7 months ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆34Updated 3 years ago
- Python library for threat intelligence☆87Updated 5 months ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated last week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- A tool for studying JavaScript malware.☆15Updated 2 weeks ago
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 5 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated last week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 6 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- A YARA & Malware Analysis Toolkit written in Rust.☆35Updated this week
- A web scraper to create MISP events and reports☆16Updated this week
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- ☆143Updated 3 weeks ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 11 months ago
- God Mode Detection Rules☆134Updated 10 months ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆36Updated 2 weeks ago
- Can you pay the ransom in your country?☆14Updated last year
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆66Updated last year
- ☆92Updated last month