Resources I've found useful for my CTI work
☆12Dec 27, 2023Updated 2 years ago
Alternatives and similar repositories for handy-cti
Users that are interested in handy-cti are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Weaponized PoC for SMBv3 TCP codec/compression vulnerability☆18Apr 1, 2020Updated 5 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- ☆16Oct 29, 2025Updated 4 months ago
- JXA script for Mythic that prints the TCC.db☆15Apr 18, 2021Updated 4 years ago
- ☆12Oct 24, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Clubhouse private API - Clubhouse SaaS bot - Drop-in audio chat☆25Apr 1, 2024Updated last year
- Trend Micro XDR/Vision One Hunting Recipies☆18Apr 7, 2021Updated 4 years ago
- Stigma instruments the Smali assembly code of commodity Android applications in order to implement dynamic information flow tracking.☆11Nov 7, 2025Updated 4 months ago
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago
- Kotlin Multiplatform presentation that built with Kotlin Multiplatform and Compose Multiplatform☆17Jun 23, 2024Updated last year
- Python library for MIME type parsing, normalisation and grouping.☆13Nov 13, 2024Updated last year
- ☆22Dec 30, 2025Updated 2 months ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Development repository for the snort cookbook☆27Mar 2, 2026Updated 3 weeks ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Updated this week
- Library for detecting tracking data transmissions from web or app traffic in HAR format.☆11Oct 22, 2025Updated 5 months ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- Repository for hosting the MITRE Cyber Academy website.☆11Apr 12, 2023Updated 2 years ago
- Application for STIX v2.0 objects management and analysis☆27Nov 9, 2017Updated 8 years ago
- Understanding and analyzing carrier files workshop repo☆51Dec 4, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆25Jun 13, 2022Updated 3 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- Various tools used to monitor and troubleshoot Azure Sentinel data☆31Oct 24, 2024Updated last year
- A terminal plugin to make Kali Linux objectively better - compatible with ohmyzsh☆18Jan 23, 2024Updated 2 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Unifi Images☆26Apr 4, 2025Updated 11 months ago
- A curated list of awesome threat detection and hunting resources☆16Sep 12, 2018Updated 7 years ago
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 9 months ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆53Mar 4, 2026Updated 3 weeks ago
- Enrich IP addresses with metadata and threat intelligence indicators.☆24Aug 12, 2023Updated 2 years ago
- ☆10Jul 24, 2020Updated 5 years ago
- Random Tools☆19Jan 23, 2019Updated 7 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middlew…☆33Apr 25, 2020Updated 5 years ago
- http://moaistory.blogspot.com/2018/10/winsearchdbanalyzer.html☆127Jul 20, 2024Updated last year