Cosive / cti-toolkit
CERT Australia Cyber Threat Intelligence (CTI) Toolkit
☆12Updated 7 years ago
Alternatives and similar repositories for cti-toolkit:
Users that are interested in cti-toolkit are comparing it to the libraries listed below
- ☆33Updated 3 months ago
- Hashes of infamous malware☆26Updated last year
- ☆15Updated last year
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 5 years ago
- ☆21Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆29Updated 8 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Scripts to threat optics stack quickly / abbreviated and automated. Run after APT-Lab-Terraform☆13Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- ☆11Updated 4 years ago
- buffer overflow examples☆22Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆24Updated 8 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆23Updated 3 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆19Updated 6 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆16Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago