A collection of Covid-19 related threat intelligence and resources.
☆19Jul 17, 2020Updated 5 years ago
Alternatives and similar repositories for Covid-19-CTI
Users that are interested in Covid-19-CTI are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 5 years ago
- Machine Learning Model to detect hidden malwares and phase changing malwares.It predicts the date of the next probable attack of the malw…☆13Apr 30, 2020Updated 6 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 7 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 5 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 6 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 8 years ago
- This project is based on detecting phishing/fraud/malicious website using Random Forest Classification formula. Implemented using Python …☆27Oct 2, 2020Updated 5 years ago
- Fixes and patches☆20Dec 3, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆19Oct 18, 2016Updated 9 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- A fully undetected, hidden, persistent, reverse netcat shell backdoor for Windows.☆24Dec 4, 2020Updated 5 years ago
- SqlServer Linked Password Dumper.☆17Apr 28, 2017Updated 9 years ago
- IP geolocation for authentication events with MozDef☆10Apr 29, 2019Updated 7 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 9 years ago
- Laravel 5 package for the Google Safebrowsing API☆12Oct 16, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆19Sep 21, 2020Updated 5 years ago
- Free incident cyber response plan template☆49Aug 19, 2025Updated 9 months ago
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆26Oct 3, 2020Updated 5 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆41Oct 28, 2017Updated 8 years ago
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆35May 3, 2026Updated 2 weeks ago
- A shell script that creates a Nginx configuration for using Spamhaus DROP lists☆26Sep 23, 2012Updated 13 years ago
- CRITs - Collaborative Research Into Threats☆21Mar 13, 2019Updated 7 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 12 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Reworked assets for Azure Sentinel using Cisco Umbrella logs as source. Includes logstash config for Cisco Umbrella using Cisco managed A…☆12Apr 14, 2020Updated 6 years ago
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago
- Human name parser based on JavaScrip-Name-Parser by Josh Fraser.☆12May 4, 2015Updated 11 years ago
- Computer Security project☆23Jun 11, 2014Updated 11 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 8 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆76Mar 8, 2019Updated 7 years ago