SamsungLabs / TwiTi
This is a project of "#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)
☆171Updated last year
Alternatives and similar repositories for TwiTi:
Users that are interested in TwiTi are comparing it to the libraries listed below
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆71Updated last year
- Code and yara rules to detect and analyze Cobalt Strike☆264Updated 3 years ago
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆129Updated this week
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆35Updated 2 years ago
- ☆45Updated 3 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆124Updated 3 years ago
- Source code used at TweetFeed.live☆41Updated 2 years ago
- ☆42Updated 2 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆119Updated last year
- This is a project of "Cybersecurity Event Detection with New and Re-emerging Words". (ASIACCS 2020)☆28Updated 11 months ago
- IoT and Operational Technology Honeypot☆105Updated last year
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆174Updated 10 months ago
- Elemental - An ATT&CK Threat Library☆318Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆84Updated 3 months ago
- ☆30Updated last year
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆41Updated 8 months ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆201Updated 2 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆100Updated 3 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆246Updated 2 years ago
- A guided mutation-based fuzzer for ML-based Web Application Firewalls☆183Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Suricata rules for the new critical vulnerabilities☆81Updated 4 years ago
- ☆21Updated 3 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆164Updated last week
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆322Updated 2 years ago
- Automatically created C2 Feeds☆592Updated this week
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆12Updated 3 years ago
- ☆54Updated 9 months ago
- We publish our challenge questions for everyone.☆94Updated 4 years ago