SamsungLabs / TwiTi
This is a project of "#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)
☆167Updated last year
Related projects: ⓘ
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆121Updated this week
- Code and yara rules to detect and analyze Cobalt Strike☆262Updated 3 years ago
- IoT and Operational Technology Honeypot☆104Updated 11 months ago
- Explore Indicators of Compromise Automatically☆94Updated 4 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173Updated 3 months ago
- ☆44Updated 2 years ago
- Elemental - An ATT&CK Threat Library☆313Updated last year
- ☆43Updated last year
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, or text formats☆25Updated this week
- Automatically created C2 Feeds☆509Updated this week
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆122Updated 2 years ago
- Setup scripts for my Malware Analysis VMs☆243Updated 2 years ago
- Tool based on CobaltStrikeParser from SentinelOne which can be used to spam a CobaltStrike server with fake beacons☆365Updated 3 years ago
- Suricata rules for the new critical vulnerabilities☆79Updated 3 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆295Updated last year
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆34Updated 2 years ago
- ☆183Updated 3 weeks ago
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 5 months ago
- ☆444Updated 3 years ago
- ☆22Updated this week
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆111Updated 10 months ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆98Updated 3 years ago
- ☆130Updated 7 months ago
- This project used for convert sigma rules to excel☆9Updated 2 years ago
- ☆18Updated 3 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆201Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆71Updated last week
- Incident Response - Fast suspicious file finder☆231Updated 2 years ago
- Nmap script to guess* a GitLab version.☆211Updated this week
- Visually inspect and force decode YARA and regex matches found in both binary and text data. With Colors.☆99Updated 5 months ago