tjnull / TJ-OSINT-Notebook
This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to performing reconaissance and OSINT operations. This Notebook has helped me in many situations to learn more about OSINT and how to analyze the data that is out there on the internet.
☆343Updated 7 months ago
Alternatives and similar repositories for TJ-OSINT-Notebook:
Users that are interested in TJ-OSINT-Notebook are comparing it to the libraries listed below
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆228Updated last year
- A list of bookmarks I have used since I started my journey in cyber security☆283Updated 2 years ago
- ☆236Updated 2 months ago
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆243Updated 2 years ago
- Practical Windows Forensics Training☆650Updated last year
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆645Updated last year
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆208Updated 3 months ago
- The OSINT Field Manual☆113Updated 2 months ago
- A categorized list of resources presented during the 2023 Sans OSINTSummit☆161Updated last year
- ☆263Updated last year
- Bootstraps, cheat-sheets, and guides for the OSCP exam.☆90Updated 10 months ago
- ☆421Updated 7 months ago
- A RedTeam Toolkit☆394Updated last week
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆220Updated this week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆350Updated 2 months ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆187Updated 11 months ago
- CLI tools for forensic investigation of Windows artifacts☆328Updated 5 months ago
- Shodan Dorks 2023☆231Updated 2 months ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆655Updated 6 months ago
- A checklist to help students track their OSCP exercise progress.☆146Updated 2 years ago
- ☆647Updated 3 weeks ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 11 months ago
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆157Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 8 months ago
- ☆173Updated last year
- cURL Tool Usage for OSINT (Open-Source Intelligence)☆237Updated 2 years ago
- ☆172Updated 2 months ago
- This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!☆369Updated last year
- Tools & Resources for Cyber Security Operations☆222Updated 2 months ago
- IoT Digital Forensics Course with hands-on labs☆228Updated last year