CyberDataLab / disinfoxLinks
π¦ DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.
β50Updated 6 months ago
Alternatives and similar repositories for disinfox
Users that are interested in disinfox are comparing it to the libraries listed below
Sorting:
- Sniffing out well-known threat groupsβ64Updated last year
- A tool for mapping cyber crimeβ236Updated 2 weeks ago
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defenseβ¦β32Updated 11 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CKβ196Updated 2 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?β59Updated 7 months ago
- A OSINT project that explores how to dump data from Reactβ80Updated 4 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINTβ37Updated last year
- β120Updated 8 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered featuresβ157Updated 2 months ago
- Interactive simulation of a fictional ransomware group's dashboardβ12Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooksβ34Updated 10 months ago
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysisβ448Updated 3 months ago
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated dβ¦β267Updated this week
- β56Updated last year
- Cyber threat intelligence tool suite.β42Updated 10 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β69Updated 2 years ago
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex Worldβ150Updated last month
- Mapping of open-source detection rules and atomic tests.β193Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β130Updated 10 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β151Updated last year
- Tor onion address lookupβ59Updated last month
- automated Open Source Intelligence gatheringβ181Updated 2 months ago
- A short graduate course on cybercrime, cyberespionage, and cyberoperationsβ83Updated 2 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β126Updated last year
- A repository of advice and guides to share with friends and family who are concerned about their safety during online activities and the β¦β143Updated last year
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-takiβ¦β338Updated last week
- IOCs collected during day-to-day activitiesβ104Updated last week
- Tool to build and export timelinesβ34Updated last year
- Python Script to check website for usernameβ30Updated 9 months ago
- DPULSE - Tool for complex approach to domain OSINTβ158Updated 3 weeks ago