BRANDEFENSE / Threat-Intelligence-ResearchesLinks
The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports is available for download. This reports covers the latest activity from APT groups, as well as new information on ransomware and phishing attacks. We recommend that all Brandefense followers download this repor…
☆23Updated 2 months ago
Alternatives and similar repositories for Threat-Intelligence-Researches
Users that are interested in Threat-Intelligence-Researches are comparing it to the libraries listed below
Sorting:
- ☆24Updated last year
- Go module for striping CDN IP ranges.☆23Updated 2 months ago
- URL fingerprinting made easy☆89Updated last year
- Ransomware groups posts☆43Updated this week
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Updated 3 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Updated 4 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- ☆42Updated 8 months ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆49Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆58Updated last year
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆50Updated 10 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆116Updated 4 years ago
- OSINT tool for discovering confidential data leaked on Github.☆51Updated 2 years ago
- ATLAS - Malware Analysis Description☆21Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 months ago
- ☆16Updated 2 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11Updated 2 years ago
- Some malware samples or suspicious files I found and their reports.☆37Updated 4 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- The official command-line client for spyse.com☆49Updated 4 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Updated 3 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 2 months ago
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- A tool that adds reproducible UUIDs to YARA rules☆13Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago