Whoishere.pyWIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request.
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
IntelspyPerform automated network reconnaissance scans
XrayXRay is a tool for recon, mapping and OSINT gathering from public networks.
TinfoleakThe most complete open-source tool for Twitter intelligence analysis
Neural ApiCAI NEURAL API - Pascal based neural network API optimized for AVX, AVX2 and AVX512 instruction sets plus OpenCL capable devices including AMD, Intel and NVIDIA.
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
YetiYour Everyday Threat Intelligence
RpotReal-time Packet Observation Tool
Urlhuntera recon tool that allows searching on URLs that are exposed via shortener services
AptmapA map displaying threat actors from the misp-galaxy
Sn0intSemi-automatic OSINT framework and package manager
Threatpursuit VmThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Awesome NeuroscienceA curated list of awesome neuroscience libraries, software and any content related to the domain.
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Nnstreamer🔀 Neural Network (NN) Streamer, Stream Processing Paradigm for Neural Network Apps/Devices.
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
factoringFactor numbers using a quantum computer
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
CASECyber-investigation Analysis Standard Expression (CASE) Ontology
Vendor-Threat-Triage-LookupLookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.
pyetiPython bindings for Yeti's API
ThreatPursuit-VMThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
TurboDataMinerThe objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of information from the Burp Suite project as well as the flexible and dynamic on-the-fly modification of outgoing or incoming HTTP requests using Python scripts. Thus, Turbo Data Miner shall aid in gaining a better and fas…
CS Book🔥 Latest computer science e-books。提供最新技术类电子书下载, “我无非就是想卷死各位,或者被各位卷死!”
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
awesome-intelligence-writingAwesome collection of great and useful resources concerning intelligence writing such as manuals/guides, standards, books, and articles
nntrainerNNtrainer is Software Framework for Training Neural Network Models on Devices.
intelligence-iconsintelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
TIGMINTTIGMINT: OSINT (Open Source Intelligence) GUI software framework