Browser Shortcuts for Cyber Security Related Online Services
☆78Feb 4, 2021Updated 5 years ago
Alternatives and similar repositories for Cyber-Search-Shortcuts
Users that are interested in Cyber-Search-Shortcuts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Sep 28, 2022Updated 3 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- VSCode extension for the YARA pattern matching language☆63Jan 10, 2024Updated 2 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A YARA Rule Performance Measurement Tool☆63Feb 26, 2024Updated 2 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆61May 25, 2020Updated 5 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆117Nov 28, 2023Updated 2 years ago
- XOR Key Extractor☆51Aug 10, 2024Updated last year
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- Website crawler with YARA detection☆90Aug 20, 2023Updated 2 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Azure Sentinel Template parser☆16Nov 2, 2020Updated 5 years ago
- A guide on how to write fast and memory friendly YARA rules☆169Feb 11, 2025Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Common Exercise Format - CEXF☆11Aug 15, 2024Updated last year
- CyberChef update scripts in PowerShell & Bash☆19Apr 22, 2024Updated 2 years ago
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆11May 10, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Jul 18, 2024Updated last year
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 7 years ago
- Re-play Security Events☆1,746Mar 20, 2024Updated 2 years ago
- CSIRT Jump Bag☆27Apr 25, 2024Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆149Nov 27, 2025Updated 5 months ago
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆118Oct 14, 2025Updated 6 months ago