Use open source tools and network intelligence to help organizations with attack surface discovery and identification of security vulnerabilities. Identification of an...
Recon-ng is a reconnaissance framework that can perform open source web based information gathering for a given target. Recon-ng is loaded with...
A project written in Python to twitter tracking and analysis without using Twitter API. Prerequisites This project is a Python 3.x application....
Spiderfoot is an open source tool used for reconnaissance purpose. The tool is capable of gathering useful information about the target host...
The Operative Framework tool can be used within a red team/social engineering engagement to collect information regarding websites and enterprises. The tool...
DeepLocker Artificial intelligence (AI) is seen as a potential solution to automatically detect malware and combat and stop cyber attacks before it...
Researchers developed this stealth-attacking software Enterprise network security researchers have worked with artificial intelligence to automatically detect and fight malware attacks, as well as...
What is Cindicator? Cindicator fuses together machine learning and market analysis for asset management and financial analytics. The Cindicator team dubs this...
The most complete open-source tool for Twitter intelligence analysis Introduction tinfoleak is an open-source tool within the OSINT (Open Source Intelligence) and SOCMINT (Social Media Intelligence) disciplines,...
OSINT tool, CLI Tool For Open Source And Threat Intelligence Install You can simply pip install the tool: pip3 install git+http://[email protected]/Te-k/harpoon --process-dependency-links Optionally...
It’s a common habit of humans and companies to flaunt their achievements every new year. Google has just announced that it managed to wipe...
Threat intelligence chat bots are useful friends. They perform research for you and can even be note takers or central aggregators of...
gOSINT is a small OSINT framework in golang, it’s actually in development and still not ready for production if you want, feel free to...
Yeti is a platform meant to organize observables, indicators of compromise, TTPs, and knowledge on threats in a single, unified repository. Yeti...
The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs). GOSINT allows a security...
The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs). GOSINT allows a security...
Canada’s Communications Security Establishment (CSE) intel agency has released the source code for one of its malware analysis tools dubbed Assemblyline. The...
Intelligence and Reconnaissance Package/Bundle installer. IntRec-Pack is a Bash script designed to download, install and deploy several quality OSINT, Recon and Threat...
The objective of this program is to gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like...
WikiLeaks Revealed a new document of CIA Secret operations called “ExpressLane” that conducts against CIA’s information sharing Service Partners (liaison services) like NSA,DHS ,and FBI....
By now you might be aware of Marcus Hutchins, the hero who halted WannaCry ransomware and was arrested by the FBI at Las...