spmedia / Threat-Actor-Usernames-ScrapeLinks
A collection of intel and usernames scraped from various cybercrime sources & forums. DarkForums, HackForums, Patched, Cracked, BreachForums, LeakBase, & more
☆128Updated this week
Alternatives and similar repositories for Threat-Actor-Usernames-Scrape
Users that are interested in Threat-Actor-Usernames-Scrape are comparing it to the libraries listed below
Sorting:
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆67Updated 5 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆140Updated 2 years ago
- All-sources tool to search websites by favicons☆182Updated last year
- To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing …☆75Updated last week
- A meta-list of public references to threat actor profiles and APT group datasets.☆72Updated 3 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆93Updated 7 months ago
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆71Updated 5 months ago
- 🕵️ Email osint tool☆64Updated 2 years ago
- A curated list of OSINT tools for company research, internet scanning, DNS, and Whois lookups, organized for easy access. Ideal for analy…☆205Updated last year
- ☆141Updated last year
- A OSINT project that explores how to dump data from React☆81Updated 3 months ago
- A Linkedin Activity date Finder☆64Updated 9 months ago
- Tor onion address lookup☆59Updated this week
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆168Updated 9 months ago
- Strumenti utili per la ricerca di WebCam e Wifi di pubblico accesso - Useful tools for searching for public access webcams and Wi-Fi netw…☆112Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 9 months ago
- DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login…☆66Updated last week
- ☆43Updated last year
- Capture screenshots of onion services on an onion service.☆73Updated last year
- Operation Archive - Saving the history behind Cybercriminal Arrests, Documentation, Raids, Seizures, and more!☆64Updated 2 months ago
- Discover and monitor internet assets using favicon hashes across search engines.☆220Updated 2 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Chrome Extensions for OSINT☆159Updated 2 months ago
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the …☆143Updated last year
- Step-by-step guide to building a custom machine for OSINT activities. The Basic Package includes a robust LINUX system strengthening proc…☆128Updated last year
- InfoHound is an OSINT to extract a large amount of data given a web domain name.☆162Updated 3 months ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆171Updated 4 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆80Updated 3 months ago
- Regular Expressions List used in Digital Forensic Tasks☆92Updated 10 months ago