Browser Shortcuts for Cyber Security Related Online Services
☆78Feb 4, 2021Updated 5 years ago
Alternatives and similar repositories for Cyber-Search-Shortcuts
Users that are interested in Cyber-Search-Shortcuts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Sep 28, 2022Updated 3 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Nov 12, 2021Updated 4 years ago
- VSCode extension for the YARA pattern matching language☆63Jan 10, 2024Updated 2 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A YARA Rule Performance Measurement Tool☆61Feb 26, 2024Updated 2 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆60May 25, 2020Updated 5 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆118Nov 28, 2023Updated 2 years ago
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- XOR Key Extractor☆51Aug 10, 2024Updated last year
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- Website crawler with YARA detection☆90Aug 20, 2023Updated 2 years ago
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Azure Sentinel Template parser☆16Nov 2, 2020Updated 5 years ago
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- ☆19Mar 31, 2022Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- CyberChef update scripts in PowerShell & Bash☆19Apr 22, 2024Updated last year
- PoC compilation of libyara into WASM, for potential future CyberChef integration☆14Sep 18, 2022Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Bitcoin trading using machine learning proof of concept☆10Sep 21, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Jul 18, 2024Updated last year
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Re-play Security Events☆1,734Mar 20, 2024Updated 2 years ago
- CSIRT Jump Bag☆27Apr 25, 2024Updated last year
- Dictionary of CTI-related acronyms, terms, and jargon☆148Nov 27, 2025Updated 4 months ago