rstcloud / awesome-threat-actor-resourcesLinks
A meta-list of public references to threat actor profiles and APT group datasets.
☆38Updated this week
Alternatives and similar repositories for awesome-threat-actor-resources
Users that are interested in awesome-threat-actor-resources are comparing it to the libraries listed below
Sorting:
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆38Updated this week
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆37Updated 2 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆36Updated this week
- A tool to check microsofts user real endpoint to get data about a tenant.☆14Updated 3 months ago
- ☆62Updated last year
- Top 400 passwords as per HaveIBeenPwned☆22Updated 7 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆13Updated 8 months ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.☆18Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆27Updated 10 months ago
- An interactive Bash-based network scanning tool that provides live host discovery, port scanning, traceroute, and ping tests, featuring v…☆33Updated 2 months ago
- SprayShark is a modular G-Suite password sprayer with threading!☆38Updated 2 weeks ago
- A Linkedin Activity date Finder☆48Updated last month
- ☆39Updated 5 months ago
- Cisco IOS Security Inspector☆31Updated 2 months ago
- ☆27Updated 8 months ago
- ☆31Updated 2 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆33Updated last year
- Tools and Resources for Physical Security Red Teaming☆31Updated 2 months ago
- ☆32Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 7 months ago
- Subdomains scanner Spider☆13Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 2 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- An OSINT tool tailored for comprehensive collection, analysis, and interpretation of cyber threat intelligence from Telegram channels and…☆92Updated last year