SamsungLabs / TwiTiLinks
This is a project of "#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)
☆171Updated 2 years ago
Alternatives and similar repositories for TwiTi
Users that are interested in TwiTi are comparing it to the libraries listed below
Sorting:
- Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds☆132Updated this week
- 利用预训练语言模型从非结构化威胁报告中提取 MITRE ATT&CK TTP 信息☆73Updated last year
- Source code used at TweetFeed.live☆42Updated 2 years ago
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- ☆45Updated 3 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆37Updated 3 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆266Updated 4 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆87Updated 5 months ago
- IoT and Operational Technology Honeypot☆104Updated last year
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 3 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆174Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆122Updated last year
- ☆43Updated 2 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆328Updated 2 years ago
- Elemental - An ATT&CK Threat Library☆317Updated 2 years ago
- We publish our challenge questions for everyone.☆94Updated 4 years ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆125Updated 3 years ago
- ☆30Updated 2 years ago
- Python library for dissecting and parsing Cobalt Strike related data such as Beacon payloads and Malleable C2 Profiles☆167Updated 2 months ago
- Automatically created C2 Feeds☆615Updated this week
- Suricata rules for the new critical vulnerabilities☆82Updated 4 years ago
- AutoSpear☆61Updated last year
- ☆130Updated last year
- Community modules for CAPE Sandbox☆97Updated last week
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆33Updated this week
- This project used for convert sigma rules to excel☆9Updated 3 years ago
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- ☆22Updated 9 months ago
- This project fully automates the process of analyzing and exploiting IoT malware to find live CnC servers.☆42Updated 10 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆248Updated 2 years ago