0x4D31 / sqhunter
☆66Updated this week
Related projects: ⓘ
- Honeypot log processor to create OTX Pulse entries☆29Updated 8 months ago
- Universal Honey Pot☆31Updated last year
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Deploy MISP Project software with Vagrant.☆42Updated 4 years ago
- first commit☆20Updated 10 months ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆43Updated 3 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆28Updated 6 years ago
- TITO is a light framework for operationalizing threat intelligence that is platform and data agnostic.☆20Updated 4 years ago
- Harbinger Threat Intelligence☆81Updated 8 years ago
- ☆27Updated this week
- Cyber Intel Management☆46Updated 6 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- Performs OCR on image files and scans them for matches to YARA rules☆39Updated 5 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Security Onion Elastic Stack☆46Updated 3 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆18Updated 7 years ago
- ☆47Updated this week
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated last year
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- ☆50Updated 6 years ago
- AYY LMAO☆21Updated 8 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆37Updated 4 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 9 years ago
- A set of templates for documenting threat intelligence☆72Updated 11 years ago
- SANS Hunting on the Cheap☆35Updated 8 years ago
- Credential Phish Analysis and Automation☆93Updated 6 years ago
- ☆19Updated this week