BRANDEFENSE / Threat-Intelligence-ResearchesLinks
The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports is available for download. This reports covers the latest activity from APT groups, as well as new information on ransomware and phishing attacks. We recommend that all Brandefense followers download this repor…
☆23Updated 3 years ago
Alternatives and similar repositories for Threat-Intelligence-Researches
Users that are interested in Threat-Intelligence-Researches are comparing it to the libraries listed below
Sorting:
- ☆24Updated last year
- Ransomware groups posts☆42Updated this week
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 3 years ago
- URL fingerprinting made easy☆89Updated last year
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆33Updated last year
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 3 weeks ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆21Updated this week
- ☆16Updated 2 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- ☆24Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Go module for striping CDN IP ranges.☆24Updated 5 years ago
- ATLAS - Malware Analysis Description☆21Updated 2 years ago
- A database for storing, querying and doing stats on credential leaks☆39Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- Some malware samples or suspicious files I found and their reports.☆39Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Updated 3 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Updated last year
- ☆42Updated 5 months ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆35Updated this week
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Linux privilege escalation auditing tool☆19Updated 2 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Updated 4 years ago
- ☆33Updated 8 months ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- ☆11Updated 2 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆23Updated last year