MishcondeReya / Covid-19-CTIView external linksLinks
A collection of Covid-19 related threat intelligence and resources.
☆19Jul 17, 2020Updated 5 years ago
Alternatives and similar repositories for Covid-19-CTI
Users that are interested in Covid-19-CTI are comparing it to the libraries listed below
Sorting:
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆17Aug 31, 2018Updated 7 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 5 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22May 4, 2024Updated last year
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated 11 months ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago
- Tracking APT IOCs☆25Nov 16, 2020Updated 5 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆28Oct 2, 2020Updated 5 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 9 months ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Computer Security project☆23Jun 11, 2014Updated 11 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- ☆12Sep 9, 2023Updated 2 years ago
- the fastest way to consume threat intelligence.☆31Mar 9, 2023Updated 2 years ago
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Jun 4, 2022Updated 3 years ago
- ☆10Dec 5, 2017Updated 8 years ago
- Crawler based on a modified browser to detect online tracking.☆11Jul 19, 2023Updated 2 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- ☆13Jan 29, 2026Updated 2 weeks ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Oct 28, 2017Updated 8 years ago
- Using outlook COM objects to create convincing phishing emails without the user noticing. This project is meant for internal phishing.☆155Dec 22, 2020Updated 5 years ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Jul 23, 2024Updated last year