soufianetahiri / deepdarkCTILinks
Collection of Cyber Threat Intelligence sources from the deep and dark web
☆12Updated 4 months ago
Alternatives and similar repositories for deepdarkCTI
Users that are interested in deepdarkCTI are comparing it to the libraries listed below
Sorting:
- Collection of extra pentest tools for Kali Linux☆109Updated last month
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Malware vulnerability intel tool for third-party attackers☆122Updated last year
- A WLAN red team framework.☆155Updated last year
- URL fingerprinting made easy☆89Updated last year
- Custom pentesting tools☆25Updated 4 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆72Updated last year
- Collection of danish base wordlists for cracking danish passwords (Hashcat, John the Ripper etc.)☆27Updated 2 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆29Updated 3 weeks ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated 2 weeks ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Your go-to resource for all things OSINT☆181Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆38Updated 4 months ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆33Updated last year
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆92Updated last month
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year