Trending repositories for topic threat-intelligence
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Collection of Cyber Threat Intelligence sources from the deep and dark web
A curated list of annual cyber security reports
The FLARE team's open-source tool to identify capabilities in executable files.
A resource containing all the tools each ransomware gangs uses
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
An authoritative list of awesome devsecops tools with the help from community experiments and contributions.
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Warning lists to inform users of MISP about potential false-positives or other information in indicators
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Awesome list of keywords and artifacts for Threat Hunting sessions
A list of online news & info sources in the InfoSec/Cybersecurity space
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A curated list of annual cyber security reports
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
A resource containing all the tools each ransomware gangs uses
Warning lists to inform users of MISP about potential false-positives or other information in indicators
Awesome list of keywords and artifacts for Threat Hunting sessions
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
A list of online news & info sources in the InfoSec/Cybersecurity space
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Collection of Cyber Threat Intelligence sources from the deep and dark web
The FLARE team's open-source tool to identify capabilities in executable files.
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
An authoritative list of awesome devsecops tools with the help from community experiments and contributions.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A resource containing all the tools each ransomware gangs uses
Collection of Cyber Threat Intelligence sources from the deep and dark web
A curated list of annual cyber security reports
An authoritative list of awesome devsecops tools with the help from community experiments and contributions.
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
The FLARE team's open-source tool to identify capabilities in executable files.
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
A curated list of annual cyber security reports
A resource containing all the tools each ransomware gangs uses
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat intelligence.
A curated list of awesome malware persistence tools and resources.
Warning lists to inform users of MISP about potential false-positives or other information in indicators
A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
A list of online news & info sources in the InfoSec/Cybersecurity space
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.
Customizable SIEM and XDR powered by Real-Time correlation and Threat Intelligence
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Collection of Cyber Threat Intelligence sources from the deep and dark web
The FLARE team's open-source tool to identify capabilities in executable files.
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
A resource containing all the tools each ransomware gangs uses
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
An authoritative list of awesome devsecops tools with the help from community experiments and contributions.
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
A curated list of annual cyber security reports
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programming, Web App Security, Cloud Security, Devsecops, Ethical Hack...
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat intelligence.
A curated list of annual cyber security reports
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat D...
yara detection rules for hunting with the threathunting-keywords project
A comprehensive, high-quality URL shorteners domain list for whitelist/allowlist or blacklist/blocklist purposes, utilized by NextDNS, ControlD, RethinkDNS, dnslow.me, and other OSINT projects.
A resource containing all the tools each ransomware gangs uses
The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.
A collection of phishing samples for researchers and detection developers.
Iterate.ai has open-sourced a powerful Weapons Detection AI software. The AI was trained on about 100 live guns, plus 20,000 videos of robberies and threats involving weapons. Our engineers taught the...
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
A collection of malware families and malware samples which use the Rust programming language.
Discover and track internet assets using favicon hashes through search engines.
AI-powered tool designed to help producing Threat Intelligence Mindmap.
Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programming, Web App Security, Cloud Security, Devsecops, Ethical Hack...
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record
ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
The FLARE team's open-source tool to identify capabilities in executable files.
Collection of Cyber Threat Intelligence sources from the deep and dark web
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
A resource containing all the tools each ransomware gangs uses
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
An authoritative list of awesome devsecops tools with the help from community experiments and contributions.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
This repo contains IOC, malware and malware analysis associated with Public cloud
Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indicator matches.
A collection of malware families and malware samples which use the Rust programming language.
yara detection rules for hunting with the threathunting-keywords project
Customizable SIEM and XDR powered by Real-Time correlation and Threat Intelligence
A resource containing all the tools each ransomware gangs uses
A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat intelligence.
Powershell script to help Speed up Threat hunting incident response processes
A curated list of annual cyber security reports
PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record
A curated list of Awesome Threat Intelligence Blogs
A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense