Pinned Repositories
bitcoinbook
Mastering Bitcoin 2nd Edition - Programming the Open Blockchain
deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
Exploring-APT-campaigns
Further investigation in to APT campaigns disclosed by private security firms and security agencies
Maltego
Maltego compilation of various assets, local transforms and helpful scripts
NucleusSoftware123POC
testing
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
OSINT-Tools
:eyes: Some of my favorite OSINT tools.
Phishtank-Scanner
Script to search a victims of Phishing within PhishTank.
public-pentesting-reports
Curated list of public penetration test reports released by several consulting firms and academic security groups
threat-analytics-search
Threat Analytics Search Chrome Extension
coderbalkrishna's Repositories
coderbalkrishna/OSINT-Tools
:eyes: Some of my favorite OSINT tools.
coderbalkrishna/deepdarkCTI
Collection of Cyber Threat Intelligence sources from the deep and dark web
coderbalkrishna/Exploring-APT-campaigns
Further investigation in to APT campaigns disclosed by private security firms and security agencies
coderbalkrishna/Maltego
Maltego compilation of various assets, local transforms and helpful scripts
coderbalkrishna/threat-analytics-search
Threat Analytics Search Chrome Extension
coderbalkrishna/bitcoinbook
Mastering Bitcoin 2nd Edition - Programming the Open Blockchain
coderbalkrishna/public-pentesting-reports
Curated list of public penetration test reports released by several consulting firms and academic security groups
coderbalkrishna/NucleusSoftware123POC
testing
coderbalkrishna/Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
coderbalkrishna/Phishtank-Scanner
Script to search a victims of Phishing within PhishTank.
coderbalkrishna/MalwareTesting-
Testing
coderbalkrishna/torghost
TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.