Censys-Research / censeye
☆126Updated last week
Alternatives and similar repositories for censeye:
Users that are interested in censeye are comparing it to the libraries listed below
- HASH (HTTP Agnostic Software Honeypot)☆137Updated 10 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 4 months ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆102Updated 5 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆82Updated 4 months ago
- ☆85Updated last month
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆31Updated 7 months ago
- Signature based honeypot detector tool written in Golang☆89Updated this week
- Automated YARA Rule Standardization and Quality Assurance Tool☆196Updated this week
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆120Updated last month
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆101Updated 5 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆76Updated last week
- Cyber Underground General Intelligence Requirements☆90Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆147Updated 5 months ago
- MISP Playbooks☆186Updated last month
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆109Updated 3 months ago
- LotL RMM☆144Updated this week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆23Updated last month
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- Rules shared by the community from 100 Days of YARA 2024☆84Updated 2 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- ☆122Updated 2 weeks ago
- An opensource sigma conversion tool built using pysigma☆119Updated 2 months ago
- Mapping of open-source detection rules and atomic tests.☆154Updated last month
- BlackBerry Threat Research & Intelligence☆99Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 10 months ago
- Examine Chrome extensions for security issues☆79Updated last week