ThreatingestorExtract and aggregate threat intelligence.
Stars: ✭ 439 (+382.42%)
MetabigorIntelligence tool but without API key
Stars: ✭ 424 (+365.93%)
DorknetSelenium powered Python script to automate searching for vulnerable web apps.
Stars: ✭ 256 (+181.32%)
SuperLibraryInformation Security Library
Stars: ✭ 60 (-34.07%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+68.13%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (+365.93%)
iocingestorAn extendable tool to extract and aggregate IoCs from threat feeds
Stars: ✭ 25 (-72.53%)
Probe spiderProbe_Spider is a Open Source Intelligence Tool made complete out of Python.
Stars: ✭ 20 (-78.02%)
Osint collectionMaintained collection of OSINT related resources. (All Free & Actionable)
Stars: ✭ 809 (+789.01%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-30.77%)
QuickScanPort scanning and domain utility.
Stars: ✭ 26 (-71.43%)
Spaces FinderA tool to hunt for publicly accessible DigitalOcean Spaces
Stars: ✭ 122 (+34.07%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (+69.23%)
KarmaFind leaked emails with your passwords
Stars: ✭ 154 (+69.23%)
Intrec PackIntelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (+94.51%)
IkyOSINT Project
Stars: ✭ 203 (+123.08%)
PockintA portable OSINT Swiss Army Knife for DFIR/OSINT professionals 🕵️ 🕵️ 🕵️
Stars: ✭ 196 (+115.38%)
OsweepDon't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+147.25%)
NetzDiscover internet-wide misconfigurations while drinking coffee
Stars: ✭ 159 (+74.73%)
Awesome-CyberSec-ResourcesAn awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+200%)
NtlmreconEnumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+176.92%)
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (-37.36%)
BinsnitchDetect silent (unwanted) changes to files on your system
Stars: ✭ 144 (+58.24%)
TweetFeedCollecting IOCs posted on Twitter
Stars: ✭ 181 (+98.9%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-79.12%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+225.27%)
MimirOSINT Threat Intel Interface - CLI for HoneyDB
Stars: ✭ 104 (+14.29%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-50.55%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-50.55%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-32.97%)
flydnsRelated subdomains finder
Stars: ✭ 29 (-68.13%)
tutorialsAdditional Resources For Securing The Stack Tutorials
Stars: ✭ 36 (-60.44%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+642.86%)
GDPatrolA Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (-45.05%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-75.82%)
connectorsOpenCTI connectors
Stars: ✭ 135 (+48.35%)
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+208.79%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+215.38%)
OSINT-BrazucaRepositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Stars: ✭ 508 (+458.24%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (-39.56%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+7849.45%)
hacking-resourcesHacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security professionals.
Stars: ✭ 1,386 (+1423.08%)
go-spyseThe official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-72.53%)
maalikFeature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (-17.58%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (+32.97%)
The Big List Of Hacked Malware Web SitesThis repository contains a list of all web sites I come across that are either hacked with or purposefully hosting malware, ransomware, viruses or trojans.
Stars: ✭ 125 (+37.36%)