0xDanielLopez / TweetFeed_codeLinks
Source code used at TweetFeed.live
☆46Updated 2 years ago
Alternatives and similar repositories for TweetFeed_code
Users that are interested in TweetFeed_code are comparing it to the libraries listed below
Sorting:
- yara detection rules for hunting with the threathunting-keywords project☆149Updated 4 months ago
- Welcome to the SEKOIA.IO Community repository!☆164Updated 2 months ago
- Open IOC sharing platform☆61Updated 10 months ago
- ☆34Updated this week
- Cyber Threat Intelligence Data, Indicators, and Analysis☆97Updated 2 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- ☆33Updated this week
- ☆53Updated last month
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 2 months ago
- ☆96Updated 5 months ago
- ☆144Updated 2 months ago
- IOCs for various malware families☆11Updated last year
- C2 Active Scanner☆60Updated last year
- Threat Hunting queries for various attacks☆239Updated this week
- Incident Response - Fast suspicious file finder☆244Updated 3 years ago
- Collection of rules created using YARA-Signator over Malpedia☆135Updated 10 months ago
- Linux Evidence Acquisition Framework☆118Updated last year
- ☆195Updated last year
- ShellSweeping the evil.☆179Updated 10 months ago
- ☆49Updated 2 weeks ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆57Updated 5 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆189Updated 5 months ago
- Sigma rules to share with the community☆121Updated 8 months ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆140Updated 3 weeks ago
- Active C2 IoCs☆99Updated 2 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆43Updated 2 weeks ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆137Updated this week
- Initial triage of Windows Event logs☆102Updated last year
- ☆43Updated 2 years ago
- ☆67Updated 2 years ago