Skip to content
View Alb-310's full-sized avatar
🦊
🦊

Block or report Alb-310

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results
JavaScript 3 Updated Nov 5, 2025

Daily C2 threat intelligence feed

Shell 19 1 Updated Dec 20, 2025

A flexible free and unlimited python tool to translate between different languages in a simple way using multiple translators.

Python 1,911 232 Updated Jul 23, 2024

AI agents can now use real Android and iOS apps, just like a human.

Python 2,016 153 Updated Dec 17, 2025

Rapports techniques de VIGINUM

36 Updated Sep 15, 2025

A phishing kit collector for scavengers

Ruby 219 39 Updated Nov 20, 2025

Feed of phish-domains found by Validin Threat Intelligince Platform

33 1 Updated Dec 19, 2025

Live Feed of C2 servers, tools, and botnets

Python 732 72 Updated Dec 15, 2025

Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, co…

Python 3,891 674 Updated Dec 6, 2025

A rigorous IoT scanner based on Shodan.io

Python 73 6 Updated Jan 15, 2025

Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)

Python 30 4 Updated Dec 16, 2025

Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract texts from images. Built for threat intel use-cases.

Python 12 2 Updated Dec 16, 2025

Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.

Python 77 6 Updated Dec 15, 2025

Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still need to investigate further, especially when their bosses requ…

12 1 Updated Sep 18, 2025

Maltego Transforms for OSINT on Telegram Messenger

Python 395 53 Updated Sep 6, 2025

The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widesprea…

Shell 1,691 264 Updated Jul 10, 2025

Collection of Cyber Threat Intelligence sources from the deep and dark web

6,398 1,080 Updated Dec 19, 2025

Infostealer and C2 developed by final-year students from the SRS major at EPITA, as part of a project for the virology course. The source code has been designed exclusively for educational purposes…

13 1 Updated Oct 10, 2024

A Python script and executable for simulating the GPS location of an iOS 17 device connected to your computer using pymobiledevice3. Provides a user-friendly GUI to set longitude and latitude coord…

TeX 12 3 Updated Jan 10, 2024

Yara scan Phishing Kit's Zip archive(s)

Python 61 11 Updated Jun 20, 2025

IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics

Go 190 36 Updated Apr 24, 2025

CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting infor…

PHP 1,519 186 Updated Sep 1, 2023

An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.

199 20 Updated Jul 3, 2024

Automatically created C2 Feeds

REXX 656 54 Updated Dec 20, 2025

The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.

324 38 Updated Jul 11, 2025

Open Adversarial Exposure Validation Platform

Java 1,454 174 Updated Dec 20, 2025

A collection of sources of documentation, as well as field best practices, to build/run a SOC

1,589 247 Updated Dec 16, 2025

Returns old TweetDeck!

JavaScript 2,304 136 Updated Dec 13, 2025

Scripts for accessing and transforming cyber threat intelligence

Python 26 8 Updated Nov 22, 2015
Next