0x4D31 / galah
Galah: An LLM-powered web honeypot.
☆382Updated last week
Related projects: ⓘ
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆906Updated last month
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆546Updated 2 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆145Updated last week
- A curated list of Awesome Threat Intelligence Blogs from the DOGESEC community.☆312Updated 2 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆436Updated 2 weeks ago
- Live Feed of C2 servers, tools, and botnets☆517Updated this week
- A centralized and enhanced memory analysis platform☆355Updated last week
- A collection of companies that disclose adversary TTPs after they have been breached☆236Updated 4 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆356Updated 8 months ago
- An offensive data enrichment pipeline☆595Updated 3 weeks ago
- A resource containing all the tools each ransomware gangs uses☆551Updated this week
- AIL framework - Analysis Information Leak framework☆563Updated this week
- Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident re…☆326Updated last month
- ☆158Updated last month
- ☆344Updated 5 months ago
- Open source templates you can use to bootstrap your security programs☆327Updated this week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆444Updated 5 months ago
- CLI tools for forensic investigation of Windows artifacts☆296Updated last month
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆160Updated 3 weeks ago
- This is a collection of threat detection rules / rules engines that I have come across.☆270Updated 4 months ago
- A curated list of large language model tools for cybersecurity research.☆376Updated 5 months ago
- Pen Test Report Generation and Assessment Collaboration☆413Updated 3 weeks ago
- Gram is Klarna's own threat model diagramming tool☆267Updated last week
- 🏴☠️💰 Another Ransomware gang tracker☆135Updated this week
- 🤖 Admyral's Python SDK simplifies writing workflow automations for Security Engineers☆259Updated this week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆248Updated 11 months ago
- Awesome Security lists for SOC/CERT/CTI☆628Updated this week
- MITRE Caldera™ for OT Plugins & Capabilities☆185Updated 8 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆192Updated last week
- Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results☆248Updated last week