JMousqueton / CTI-MSTeams-BotLinks
🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️
☆45Updated this week
Alternatives and similar repositories for CTI-MSTeams-Bot
Users that are interested in CTI-MSTeams-Bot are comparing it to the libraries listed below
Sorting:
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆190Updated 9 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 3 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- ☆53Updated last month
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Ransomware groups posts☆42Updated this week
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆157Updated 5 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 5 months ago
- Sniffing out well-known threat groups☆61Updated last year
- Assess Windows OS for security misconfigurations and hardening opportunities.☆34Updated last year
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆27Updated 3 years ago
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 7 months ago
- A collection of various SIEM rules relating to malware family groups.☆69Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 3 weeks ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Scripts and piece of codes used for Active Directory configuration☆84Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆54Updated 2 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 7 months ago
- yara detection rules for hunting with the threathunting-keywords project☆148Updated 4 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆136Updated this week
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆273Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆85Updated last month
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆117Updated 2 weeks ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆105Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year