Lists (4)
Sort Name ascending (A-Z)
Stars
A flexible free and unlimited python tool to translate between different languages in a simple way using multiple translators.
AI agents can now use real Android and iOS apps, just like a human.
Feed of phish-domains found by Validin Threat Intelligince Platform
Live Feed of C2 servers, tools, and botnets
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool, co…
Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)
Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract texts from images. Built for threat intel use-cases.
Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.
Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still need to investigate further, especially when their bosses requ…
Maltego Transforms for OSINT on Telegram Messenger
The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widesprea…
Collection of Cyber Threat Intelligence sources from the deep and dark web
Infostealer and C2 developed by final-year students from the SRS major at EPITA, as part of a project for the virology course. The source code has been designed exclusively for educational purposes…
A Python script and executable for simulating the GPS location of an iOS 17 device connected to your computer using pymobiledevice3. Provides a user-friendly GUI to set longitude and latitude coord…
Yara scan Phishing Kit's Zip archive(s)
IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics
CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting infor…
An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.
The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.
Open Adversarial Exposure Validation Platform
A collection of sources of documentation, as well as field best practices, to build/run a SOC
Scripts for accessing and transforming cyber threat intelligence