3pun0x / RepoTeleLinks
Leveraging Yara Rules to Hunt for Abused Telegram Accounts
☆15Updated 5 years ago
Alternatives and similar repositories for RepoTele
Users that are interested in RepoTele are comparing it to the libraries listed below
Sorting:
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 4 months ago
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Hashes of infamous malware☆26Updated last year
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆18Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- VirusTotal Intelligence Search☆37Updated 5 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 11 months ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 7 years ago
- ☆35Updated 3 years ago
- ☆22Updated 8 months ago
- Forensic Imaging quickstarts!☆14Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Links to malware-related YARA rules☆15Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated 2 months ago
- Parser for Sdba memory pool tags☆18Updated 3 years ago
- ☆15Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- ☆14Updated 2 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆16Updated last year
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Scan and decode NetWire logs☆12Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 6 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago