tracelabs / B-Sides-BloomingtonLinks
Resources from B-Sides Bloomington OSINT Workshop
☆13Updated last year
Alternatives and similar repositories for B-Sides-Bloomington
Users that are interested in B-Sides-Bloomington are comparing it to the libraries listed below
Sorting:
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 3 months ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- Gather and scrape info from the LinkedIn profiles of a company's employees.☆28Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆21Updated 9 months ago
- Virus Total Free - IOC parser and report generator☆24Updated 2 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆28Updated 9 months ago
- ☆52Updated 4 months ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 5 years ago
- Jupyter Notebooks for the Blue Team☆39Updated 11 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆50Updated last week
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆55Updated 2 years ago
- kb=$(cat sillynotes.txt)☆46Updated last month
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆28Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Updated 3 years ago
- ☆30Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- Hashes of infamous malware☆26Updated 2 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆29Updated 4 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Updated 2 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last month
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 4 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- ☆37Updated 4 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆28Updated 5 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year