SamsungLabs / TwiTi
This is a project of "#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)
☆170Updated last year
Alternatives and similar repositories for TwiTi
Users that are interested in TwiTi are comparing it to the libraries listed below
Sorting:
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆73Updated last year
- Code and yara rules to detect and analyze Cobalt Strike☆266Updated 4 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆174Updated 11 months ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆327Updated 2 years ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 9 months ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆186Updated last year
- ☆43Updated 2 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 3 years ago
- ☆45Updated 3 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆131Updated this week
- Elemental - An ATT&CK Threat Library☆317Updated 2 years ago
- AutoSpear☆61Updated last year
- Source code used at TweetFeed.live☆41Updated 2 years ago
- Setup scripts for my Malware Analysis VMs☆252Updated 3 years ago
- ☆130Updated last year
- ☆450Updated 3 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆31Updated 3 weeks ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆37Updated 3 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆121Updated last year
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆201Updated 3 years ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated last year
- Suricata rules for the new critical vulnerabilities☆82Updated 4 years ago
- Automatically created C2 Feeds☆613Updated this week
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆165Updated last month
- ☆30Updated 2 years ago
- We publish our challenge questions for everyone.☆94Updated 4 years ago
- Active C2 IoCs☆99Updated 2 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆103Updated 3 years ago
- IoT and Operational Technology Honeypot☆104Updated last year