AzharAnwar9 / Security-Event-Analysis-Automation-ToolLinks
A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks including Phishing Email Analysis & Brand Monitoring to fasten the incident response.
☆24Updated 2 years ago
Alternatives and similar repositories for Security-Event-Analysis-Automation-Tool
Users that are interested in Security-Event-Analysis-Automation-Tool are comparing it to the libraries listed below
Sorting:
- Ransomware groups posts☆39Updated this week
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about Social Engin…☆19Updated 3 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆47Updated last week
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆53Updated 2 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 11 months ago
- Sniffing out well-known threat groups☆28Updated 9 months ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated 2 months ago
- ☆20Updated 2 years ago
- ☆48Updated 3 weeks ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 10 months ago
- AI-Powered Dark Web OSINT Tool☆72Updated last month
- 🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️☆43Updated this week
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆52Updated 2 weeks ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- ☆12Updated 3 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Updated 3 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- List of links and resources referred to in my SANS OSINT Summit 2023 Talk: "Tips & Tricks For Digital Dumpster Diving"☆40Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Image Payload Creating/Injecting tools☆13Updated 3 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆51Updated 4 months ago
- ☆33Updated 6 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆33Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆45Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 3 months ago