Ginsberg5150 / deepdarkCTIView external linksLinks
Collection of Cyber Threat Intelligence sources from the deep and dark web
☆11Sep 21, 2022Updated 3 years ago
Alternatives and similar repositories for deepdarkCTI
Users that are interested in deepdarkCTI are comparing it to the libraries listed below
Sorting:
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated last year
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Jan 26, 2026Updated 2 weeks ago
- A OSINT project that explores how to dump data from React☆80Sep 16, 2025Updated 4 months ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- DPE - Default Password Enumeration☆36Jun 3, 2013Updated 12 years ago
- Various tools used to monitor and troubleshoot Azure Sentinel data☆31Oct 24, 2024Updated last year
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 2 years ago
- Deploy your DNS configuration using GitHub Actions using DNSControl.☆11Jan 9, 2025Updated last year
- KQL queries for Microsoft Defender Advanced Hunting organized around the TTPs of the MITRE ATT&CK framework.☆18Nov 7, 2024Updated last year
- Engineering Guidance and Standards for the Home Office☆21Feb 4, 2026Updated last week
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- ☆44Feb 27, 2017Updated 8 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated last year
- ☆12Aug 16, 2024Updated last year
- InternetOff turns access to the Internet off and on again, without affecting access to the local network. It is a small program that work…☆13Jan 1, 2020Updated 6 years ago
- VMware Guide☆14Dec 14, 2021Updated 4 years ago
- A curated compilation of national CERT alerts & advisories sources (for cybersecurity).☆13Sep 6, 2019Updated 6 years ago
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- ☆50Updated this week
- ☆11May 2, 2022Updated 3 years ago
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Puppet Guide☆10Jan 2, 2022Updated 4 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- a github repo that will be used for teaching bash optimizations in a youtube series☆10Jul 6, 2021Updated 4 years ago
- Real-World DevOps Project From Start To Finish, by Packt Publishing☆14Dec 2, 2024Updated last year
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- A collection of Ansible automation roles for my homelab.☆12Jan 17, 2025Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- TLD records archive. Revisiting the original TLDR project by mandatoryprogrammer, on the hunt for more root nameserver changes.☆11Dec 4, 2022Updated 3 years ago