STIXProject / use-cases
☆13Updated 8 years ago
Related projects: ⓘ
- ☆66Updated this week
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆25Updated 9 years ago
- A set of templates for documenting threat intelligence☆72Updated 11 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆47Updated 6 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Security Onion Elastic Stack☆46Updated 3 years ago
- Some IR notes☆73Updated 8 years ago
- repo for sharing stuff☆16Updated last year
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆43Updated 3 years ago
- Cyber Intel Management☆46Updated 6 years ago
- Scoring Engine for CTF competitions☆46Updated last year
- Presentation Slides and Video links☆31Updated 2 years ago
- Sandbox feature upgrade with the help of wrapped samples☆75Updated 6 years ago
- ☆22Updated this week
- ☆27Updated this week
- ☆35Updated this week
- Credential Phish Analysis and Automation☆93Updated 6 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- Repository of yara rules☆57Updated last year
- Mitre Att&ck Technique Emulation☆82Updated 5 years ago
- ☆27Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- Providing timelines based on OSINT Reports☆32Updated last year
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 9 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆40Updated 7 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆67Updated 6 years ago
- Yara intergrated into BurpSuite☆45Updated 8 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆39Updated 5 years ago