Browser Shortcuts for Cyber Security Related Online Services
☆78Feb 4, 2021Updated 5 years ago
Alternatives and similar repositories for Cyber-Search-Shortcuts
Users that are interested in Cyber-Search-Shortcuts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Sep 28, 2022Updated 3 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- VSCode extension for the YARA pattern matching language☆63Jan 10, 2024Updated 2 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A YARA Rule Performance Measurement Tool☆61Feb 26, 2024Updated 2 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆60May 25, 2020Updated 5 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆118Nov 28, 2023Updated 2 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- XOR Key Extractor☆51Aug 10, 2024Updated last year
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Website crawler with YARA detection☆89Aug 20, 2023Updated 2 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Azure Sentinel Template parser☆16Nov 2, 2020Updated 5 years ago
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- ☆19Mar 31, 2022Updated 3 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- CyberChef update scripts in PowerShell & Bash☆18Apr 22, 2024Updated last year
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Visual-based analysis of file system metadata. The tool enables digital forensics of large volumes of data.☆10May 10, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Jul 18, 2024Updated last year
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Re-play Security Events☆1,729Mar 20, 2024Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆147Nov 27, 2025Updated 4 months ago
- CSIRT Jump Bag☆27Apr 25, 2024Updated last year
- Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring☆117Oct 14, 2025Updated 5 months ago