J4FSec / In0ri
Website defacement attack detection with deep learning
☆61Updated 3 months ago
Alternatives and similar repositories for In0ri:
Users that are interested in In0ri are comparing it to the libraries listed below
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Notes and IoCs of fresh malware☆57Updated 9 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 4 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 10 months ago
- ☆48Updated last week
- Source code used at TweetFeed.live☆41Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- URL fingerprinting made easy☆86Updated last year
- ☆42Updated 3 weeks ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆26Updated 10 months ago
- Openhunting CTI - Threat Exposure Data Breach Account (Telegram)☆31Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated last year
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 4 months ago
- First iteration of ML based Feedback WAF☆58Updated last year
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 3 years ago
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated this week
- ☆21Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆41Updated 8 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated last month
- Tor onion address lookup☆38Updated 2 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆53Updated 2 weeks ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- ☆20Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 3 years ago