Cosive / cti-toolkit
CERT Australia Cyber Threat Intelligence (CTI) Toolkit
☆12Updated 7 years ago
Alternatives and similar repositories for cti-toolkit:
Users that are interested in cti-toolkit are comparing it to the libraries listed below
- Hashes of infamous malware☆26Updated last year
- ☆34Updated 2 months ago
- ☆11Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- ☆24Updated 2 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- ☆12Updated 3 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated this week
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- ☆14Updated 5 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Scan and decode NetWire logs☆11Updated 2 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Updated last year
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- ☆22Updated 4 years ago
- buffer overflow examples☆22Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆28Updated 8 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago