“The tech stack I rely on in my daily workflow”
🆕 Latest Resources
💀 Retired Resources
📂 Browse by Category
🧰 Multi-Tool & Aggregation Platforms
Purpose: Combine multiple security tools in one interface.
🧪 Sandboxing
Purpose: Safely execute and observe suspicious files.
📄 Forensics & Incident Response
Purpose: Collect and analyze digital evidence for investigations.
📖 Geo Intelligence
Purpose: Track, map and analyze location-based cyber activities.
🕵️ People Search & Identity OSINT
Purpose: Investigate identities using open-source data.
🌑 Dark Web Monitoring
Purpose: Detect leaked data and threats on dark web sources.
🖼️ Image Intelligence (IMGlNT)
Purpose: Identify metadata, hidden data, or visual clues in images.
🌐 Domain & IP Intelligence
Purpose: Investigate domains and IPs for ownership and suspicious activity.
📧 Email Intelligence
Purpose: Identify malicious, spoofed, or compromised email accounts.
🔗 URL Intelligence
Purpose: Detect phishing, malware, and malicious links in real time.
📦 Static Analysis Tools
Purpose: Examine files without executing them and Identify malicious code through file inspection.
⚡ Dynamic Analysis Tools
Purpose: Analyze behavior by running files in a controlled environment and Detect threats by observing runtime actions.
⭐ Miscellaneous
Purpose: Extra utilities for niche or specialized security tasks.