J4FSec / In0ri
Website defacement attack detection with deep learning
☆60Updated this week
Alternatives and similar repositories for In0ri:
Users that are interested in In0ri are comparing it to the libraries listed below
- First iteration of ML based Feedback WAF☆58Updated 9 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆80Updated last month
- ☆42Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆71Updated 3 years ago
- URL fingerprinting made easy☆82Updated 9 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆53Updated 7 months ago
- Find Email Spoofing Vulnerablity of domains☆93Updated 5 months ago
- Trends Website (URL) from Twitter hackers.☆79Updated this week
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated 2 weeks ago
- Source code used at TweetFeed.live☆39Updated 2 years ago
- ☆79Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆39Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆38Updated 2 years ago
- This Repository Talks about the Follina MSDT from Defender Perspective☆37Updated 2 years ago
- Some of my rough notes for Docker threat detection☆47Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆92Updated this week
- GUI for Volatility forensics tool written in PyQT5☆60Updated 3 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆28Updated 2 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆21Updated 2 years ago
- Openhunting CTI - Threat Exposure Data Breach Account (Telegram)☆25Updated last year
- ReconPal: Leveraging NLP for Infosec☆55Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆52Updated 2 years ago
- ☆45Updated 9 months ago
- Notes and IoCs of fresh malware☆59Updated 6 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆18Updated 2 years ago