Te-k / harpoon
CLI tool for open source and threat intelligence
☆1,177Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for harpoon
- Your Everyday Threat Intelligence☆1,751Updated this week
- Extract and aggregate threat intelligence.☆831Updated 9 months ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,306Updated this week
- Scanning pastebin with yara rules☆1,066Updated 5 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,247Updated 4 years ago
- A collection of sources of indicators of compromise.☆806Updated last month
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆865Updated 2 weeks ago
- A query aggregator for OSINT based threat hunting☆864Updated last week
- Online hash checker for Virustotal and other services☆809Updated 6 months ago
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,316Updated 7 months ago
- An information security preparedness tool to do adversarial simulation.☆1,102Updated 5 years ago
- A collection of resources for Threat Hunters☆856Updated last month
- A browser extension for OSINT search☆1,480Updated this week
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆537Updated last year
- Machinae Security Intelligence Collector☆504Updated 6 months ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆659Updated last year
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆997Updated 4 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,471Updated last year
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆532Updated this week
- Phishing catcher using Certstream☆1,713Updated 3 months ago
- Detect Tactics, Techniques & Combat Threats☆2,067Updated this week
- An informational repo about hunting for adversaries in your IT environment.☆1,721Updated 3 years ago
- FAME Automates Malware Evaluation☆862Updated this week
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆587Updated 5 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,508Updated 4 months ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆718Updated 4 years ago
- ☆1,051Updated 5 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,262Updated 7 months ago
- Actionable analytics designed to combat threats☆972Updated 2 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,649Updated last week