MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+60.97%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+217.88%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 424 (-80.42%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-95.8%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-98.98%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-98.85%)
connectorsOpenCTI connectors
Stars: ✭ 135 (-93.76%)
ScyllaThe Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc.
Stars: ✭ 154 (-92.89%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (-94.32%)
Dfw1n OsintAustralian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers
Stars: ✭ 63 (-97.09%)
OsweepDon't Just Search OSINT. Sweep It.
Stars: ✭ 225 (-89.61%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-86.74%)
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (-97.37%)
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (-79.77%)
ScrummageThe Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (-83.6%)
securitytoolsquality community projects 👨👩👧👦📓🔎
Stars: ✭ 26 (-98.8%)
ayashigeAyashige provides a list of suspicious newly updated domains as a JSON feed
Stars: ✭ 27 (-98.75%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-96.77%)
DaProfilerDaProfiler allows you to create a profile on your target based in France only. The particularity of this program is its ability to find the e-mail addresses your target.
Stars: ✭ 58 (-97.32%)
misp-osint-collectionCollection of best practices to add OSINT into MISP and/or MISP communities
Stars: ✭ 54 (-97.51%)
CTF-Write-UP澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (-98.75%)
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-98.24%)
WriteupsThis repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-97.18%)
ThreatPursuit-VMThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 1,033 (-52.29%)
go-spyseThe official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-98.85%)
AttackSurfaceManagementDiscover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-97.92%)
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (-85.03%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (-92.93%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-98.98%)
BusterAn advanced tool for email reconnaissance
Stars: ✭ 387 (-82.12%)
MitakaA browser extension for OSINT search
Stars: ✭ 483 (-77.69%)
TinfoleakThe most complete open-source tool for Twitter intelligence analysis
Stars: ✭ 1,593 (-26.42%)
OSINT-BrazucaRepositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Stars: ✭ 508 (-76.54%)
rstthreatsAggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-99.21%)
HarpoonCLI tool for open source and threat intelligence
Stars: ✭ 679 (-68.64%)
BigbountyreconBigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (-75.01%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (-62.4%)
Urlhuntera recon tool that allows searching on URLs that are exposed via shortener services
Stars: ✭ 934 (-56.86%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+166.19%)
ThreatingestorExtract and aggregate threat intelligence.
Stars: ✭ 439 (-79.72%)
Python IocextractDefanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (-86.14%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (-71.78%)
Probe spiderProbe_Spider is a Open Source Intelligence Tool made complete out of Python.
Stars: ✭ 20 (-99.08%)
DnstwistDomain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+44.3%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-96.81%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-96.63%)
CerteagleWeaponizing Live CT logs for automated monitoring of assets
Stars: ✭ 78 (-96.4%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-95.89%)
XrayXRay is a tool for recon, mapping and OSINT gathering from public networks.
Stars: ✭ 1,666 (-23.05%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-96.35%)
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (-88.18%)
BesafeBeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-99.03%)