soufianetahiri / deepdarkCTILinks
Collection of Cyber Threat Intelligence sources from the deep and dark web
☆14Updated 5 months ago
Alternatives and similar repositories for deepdarkCTI
Users that are interested in deepdarkCTI are comparing it to the libraries listed below
Sorting:
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 2 months ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆29Updated 2 months ago
- A WLAN red team framework.☆154Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Custom pentesting tools☆25Updated 5 years ago
- ☆33Updated 2 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆58Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 3 weeks ago
- Ransomware groups posts☆43Updated this week
- Python3 script to dump breach data from Dehashed☆38Updated 5 months ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- A library that scrapes Linkedin for user data☆24Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Your go-to resource for all things OSINT☆181Updated last year
- Google Meet Phishing Template For Gophish☆47Updated 3 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆28Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last week
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago