Collection of Cyber Threat Intelligence sources from the deep and dark web
☆16Dec 15, 2025Updated 3 months ago
Alternatives and similar repositories for deepdarkCTI
Users that are interested in deepdarkCTI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- Defalyzer is a cross-platform software that focuses on defacement analyzing and mirror tracking.☆14Mar 10, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Cloudflare WAF rules to protect websites☆10Mar 26, 2022Updated 4 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- mobile application (ipa & apk) static analysis tool☆16May 23, 2025Updated 10 months ago
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆13Jan 26, 2025Updated last year
- Wazuh wodle that integrates Google Workspace admin events (just like the O365 integration)☆29Jan 26, 2026Updated 2 months ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated 2 years ago
- ☆11Feb 16, 2024Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆16May 15, 2025Updated 10 months ago
- Homo Network - The best ddos botnet in 2023☆13Apr 27, 2023Updated 2 years ago
- Full disclosures for CVE ids, proofs of concept, exploits, 0day bugs and so on.☆111May 12, 2023Updated 2 years ago
- Python3 Ebowla... 3Bowla☆17Jan 7, 2020Updated 6 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Packet Batch's old DPDK program. An application that utilizes the DPDK to send network packets. Used for penetration testing including De…☆16Apr 20, 2024Updated last year
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Apr 19, 2021Updated 4 years ago
- You can create a virus for a Laptop or phone with this command bell☆10Mar 3, 2021Updated 5 years ago
- A Golang module to resolve multiple DNS requests concurrently while respecting a rate limit on the resolvers.☆12May 26, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆15Mar 17, 2018Updated 8 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25May 19, 2022Updated 3 years ago
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- A userscript to improve various features of FetLife.com, especially data portability and interoperability functionality.☆10Jun 19, 2014Updated 11 years ago
- 一个基于golang的简单漏洞扫描器☆12Feb 2, 2024Updated 2 years ago
- ☆15Nov 20, 2017Updated 8 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- Notion C2 Profile for Mythic☆40Mar 3, 2026Updated 3 weeks ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆12Feb 7, 2023Updated 3 years ago
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- The Web UI for Antnium☆27Jun 14, 2022Updated 3 years ago
- Project Interoperability: A Start-Up Guide to Info Sharing☆29Nov 22, 2016Updated 9 years ago
- LockBit-Black-Builder_ ;this is Lockbit Black Builder☆10Sep 28, 2022Updated 3 years ago
- A Firefox plugin that allows you to choose easily between different DNS over HTTPS servers☆12Apr 28, 2020Updated 5 years ago
- ASUS wifi router RCE vulnerability☆19Oct 13, 2025Updated 5 months ago