FT3: Fraud Tools, Tactics, and Techniques Framework
☆106Jul 28, 2025Updated 9 months ago
Alternatives and similar repositories for ft3
Users that are interested in ft3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 3 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated last month
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆47Nov 10, 2025Updated 5 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆11Apr 25, 2021Updated 5 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 9 months ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- A tool for folks who `git clone` first and ask questions later☆68Apr 15, 2026Updated 3 weeks ago
- FakeOpenSmtpRelay.py is a Python3 script simulating a working open SMTP relay☆13Mar 18, 2019Updated 7 years ago
- ☆18Jun 25, 2024Updated last year
- Intelligence-Led Cyber Attack Taxonomy, CAT☆11Aug 7, 2019Updated 6 years ago
- A (tampering) proxy server for Apple's Siri☆20Nov 29, 2011Updated 14 years ago
- XSSRecon automates the process of testing URL parameters for reflection of a test payload rix4uni and further checks how special characte…☆53Jan 16, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 5 months ago
- ☆15Aug 31, 2023Updated 2 years ago
- CyanogenMod device config☆30Feb 15, 2011Updated 15 years ago
- RabbitMQ exploit and Pentesting guide for penetration tester☆20Nov 22, 2023Updated 2 years ago
- TCP over DNS tunnel b[l]ind written in go.☆16Dec 22, 2024Updated last year
- Decoupled AI copilot for pentesting & CTFs. Sidecar tails your shell history, parses tool outputs, grounds suggestions in your notes, and…☆13Apr 20, 2026Updated 2 weeks ago
- ☆57Feb 16, 2025Updated last year
- Find jmp gadgets for call stack spoofing.☆81Oct 1, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆96Mar 2, 2026Updated 2 months ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆101Oct 15, 2025Updated 6 months ago
- Minigotchi ported to multiple ESP32 devices. (Main Repo (Archived) by @dj1ch)☆15Aug 24, 2025Updated 8 months ago
- OpenAEV Docker deployment helpers☆29Apr 23, 2026Updated last week
- Real Cookbooks for Nerds☆28Aug 24, 2012Updated 13 years ago
- ☆78Feb 19, 2026Updated 2 months ago
- ☆18Jan 4, 2026Updated 4 months ago
- Scrape files for sensitive information, and generate an interactive HTML report. Based on Rabin2.☆17Feb 25, 2026Updated 2 months ago
- Audits an AppLocker policy XML and reports weak/misconfigured/risky settings, including actual ACL checks.☆147Feb 16, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 3 years ago
- Oh My Pentest Report is a customizable Oh My Zsh theme designed for pentesters.☆22Feb 17, 2026Updated 2 months ago
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- A curated list of awesome threat detection and hunting resources☆19Apr 13, 2019Updated 7 years ago
- Code for "Can We Fix Social Media? Testing Prosocial Interventions using Generative Social Simulation"☆27Nov 21, 2025Updated 5 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 11 months ago