A collection of Covid-19 related threat intelligence and resources.
☆19Jul 17, 2020Updated 5 years ago
Alternatives and similar repositories for Covid-19-CTI
Users that are interested in Covid-19-CTI are comparing it to the libraries listed below
Sorting:
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- DevSecOps Guide, located devsecops.pagerduty.com☆14Jan 4, 2022Updated 4 years ago
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- This project aims to create new tweets and carry out social engineering attacks by using the messages that people sent from social media …☆12Dec 16, 2017Updated 8 years ago
- Penetration Test Framwork☆21May 10, 2018Updated 7 years ago
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- SqlServer Linked Password Dumper.☆17Apr 28, 2017Updated 8 years ago
- IP geolocation for authentication events with MozDef☆10Apr 29, 2019Updated 6 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Laravel 5 package for the Google Safebrowsing API☆12Oct 16, 2018Updated 7 years ago
- ☆19Sep 21, 2020Updated 5 years ago
- Free incident cyber response plan template☆49Aug 19, 2025Updated 7 months ago
- The Open Security Summit 2020 is focused on the collaboration between, Developers and Application Security☆26Oct 3, 2020Updated 5 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- A Robust Easy to Learn Framework☆17Jan 5, 2019Updated 7 years ago
- Bolster NEO API - Artificial intelligence based zero-hour phishing detection☆13Aug 10, 2021Updated 4 years ago
- CRITs - Collaborative Research Into Threats☆21Mar 13, 2019Updated 7 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 11 years ago
- Reworked assets for Azure Sentinel using Cisco Umbrella logs as source. Includes logstash config for Cisco Umbrella using Cisco managed A…☆13Apr 14, 2020Updated 5 years ago
- STIX2 graph widget for Jupyter notebooks, powered by stixview library☆25Jan 7, 2023Updated 3 years ago
- Human name parser based on JavaScrip-Name-Parser by Josh Fraser.☆12May 4, 2015Updated 10 years ago
- Low cost DIY open source MegaSquirt derivative.☆16Jan 15, 2017Updated 9 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Mar 8, 2019Updated 7 years ago
- material for exploit development☆18May 3, 2019Updated 6 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago