soufianetahiri / deepdarkCTILinks
Collection of Cyber Threat Intelligence sources from the deep and dark web
☆13Updated 4 months ago
Alternatives and similar repositories for deepdarkCTI
Users that are interested in deepdarkCTI are comparing it to the libraries listed below
Sorting:
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- Collection of extra pentest tools for Kali Linux☆110Updated 2 months ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- Custom pentesting tools☆25Updated 5 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆29Updated last month
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆27Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆73Updated last year
- This script generates a groups.xml file that mimics a real GPP to create a new user on domain-joined computers☆46Updated 5 years ago
- ☆33Updated 2 years ago
- URL fingerprinting made easy☆90Updated last year
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated last month
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆32Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Create visualization from Shodan query☆76Updated 4 years ago
- Ransomware groups posts☆42Updated this week
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- A WLAN red team framework.☆155Updated last year