Cosive / cti-toolkitLinks
CERT Australia Cyber Threat Intelligence (CTI) Toolkit
☆14Updated 7 years ago
Alternatives and similar repositories for cti-toolkit
Users that are interested in cti-toolkit are comparing it to the libraries listed below
Sorting:
- ☆33Updated 5 months ago
- A Darktrace CLI written in Python☆16Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- ☆11Updated 4 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆36Updated 3 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Updated 5 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 5 months ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated last year
- Shell and Pen-testing Tool☆16Updated 2 months ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- buffer overflow examples☆22Updated 7 years ago
- ☆21Updated 3 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Updated 5 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago