Collection of Cyber Threat Intelligence sources from the deep and dark web
☆16Dec 15, 2025Updated 4 months ago
Alternatives and similar repositories for deepdarkCTI
Users that are interested in deepdarkCTI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An offensive security framework for writing payloads☆19Sep 13, 2022Updated 3 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated 3 months ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆12May 13, 2024Updated last year
- Cloudflare WAF rules to protect websites☆10Mar 26, 2022Updated 4 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆13Jan 26, 2025Updated last year
- Wazuh wodle that integrates Google Workspace admin events (just like the O365 integration)☆34Jan 26, 2026Updated 3 months ago
- Red Team Server (RTS)☆16Apr 16, 2026Updated 3 weeks ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 一个各类漏洞POC知识库☆10Jul 17, 2023Updated 2 years ago
- Sigma to Wazuh rule converter☆23Apr 28, 2026Updated last week
- ☆12Aug 10, 2024Updated last year
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- ☆16May 15, 2025Updated 11 months ago
- Homo Network - The best ddos botnet in 2023☆13Apr 27, 2023Updated 3 years ago
- BT Home Hub 5 Type A firmware modification scripts☆14Apr 9, 2018Updated 8 years ago
- Python3 Ebowla... 3Bowla☆17Jan 7, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆11Jun 12, 2023Updated 2 years ago
- Packet Batch's old DPDK program. An application that utilizes the DPDK to send network packets. Used for penetration testing including De…☆16Apr 20, 2024Updated 2 years ago
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Apr 19, 2021Updated 5 years ago
- Paramalyzer - Burp extension for parameter analysis of large-scale web application penetration tests.☆33Oct 13, 2022Updated 3 years ago
- You can create a virus for a Laptop or phone with this command bell☆10Mar 3, 2021Updated 5 years ago
- A10’s ARM templates for Azure cloud☆11Sep 29, 2023Updated 2 years ago
- ☆12Jan 7, 2020Updated 6 years ago
- Rules Shared by the Community from 100 Days of YARA 2023 -☆18Apr 10, 2023Updated 3 years ago
- A service container for interacting with SRA's VECTR☆17Apr 9, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A Golang module to resolve multiple DNS requests concurrently while respecting a rate limit on the resolvers.☆12May 26, 2021Updated 4 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆11Jan 27, 2017Updated 9 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25May 19, 2022Updated 3 years ago
- Arp Spoof and inject beef hook in seconds☆13Feb 2, 2014Updated 12 years ago
- T&C and Privacy Policy for our website: https://radicallyopensecurity.com/☆17Apr 23, 2026Updated 2 weeks ago
- Kill Switch Script - stops traffic leaking from you if your VPN goes down.☆12Sep 20, 2016Updated 9 years ago
- 一个基于golang的简单漏洞扫描器☆13Feb 2, 2024Updated 2 years ago