Cyber Threat Intelligence Appliance
☆13Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for CTIA
Users that are interested in CTIA are comparing it to the libraries listed below
Sorting:
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Poshito is a Windows C2 over Telegram☆21Oct 30, 2024Updated last year
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Sep 20, 2022Updated 3 years ago
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- A fork of nim's db_sqlite library based on ndb with proper typing☆14Aug 6, 2023Updated 2 years ago
- Command-line tool to search for malware samples in various repositories☆13Mar 3, 2022Updated 4 years ago
- Library for Nim.☆15Jul 8, 2020Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- Python code examples for working with the Slack API. 2.x and 3.x compatible code.☆13May 19, 2016Updated 9 years ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- Compiles Rolex U.S. AD listings as well as pricing data to explore the relatedness of network expansion/contraction and grey market prici…☆16Sep 13, 2025Updated 6 months ago
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- Validates username & password combination(s) across a host or group of hosts using the SMB protocol.☆15Apr 6, 2020Updated 5 years ago
- Templates for Logic Apps Workflow Gallery☆29Jan 27, 2026Updated last month
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 8 years ago
- BTLE Dog&Bone smart lock hacking -- Ozlockcon 2017☆21Jun 8, 2017Updated 8 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- qemu-git PKGBUILD from AUR patched for anti-vm detection☆11Jul 31, 2021Updated 4 years ago
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- 🕷 aircrack-ng - wifi network security collection dockerized☆14Dec 1, 2016Updated 9 years ago
- A Splunk app that will rotate between dashboards on a frequency; useful for displaying content on informational big screens.☆13Mar 9, 2022Updated 4 years ago
- A collection of Security Bookmarks☆11Oct 9, 2021Updated 4 years ago
- ☆11Jan 18, 2020Updated 6 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(python版本 )☆13Jan 20, 2022Updated 4 years ago
- A low-overhead JIT assembler for Nim☆20Feb 15, 2021Updated 5 years ago
- ☆13Mar 23, 2023Updated 2 years ago
- The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings…☆19Dec 23, 2020Updated 5 years ago
- ☆15Aug 7, 2021Updated 4 years ago
- This repository stores the proof-of-concept of Windows malware categorized with MITRE ATT&CK.☆14Nov 8, 2024Updated last year
- ☆13Feb 29, 2020Updated 6 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Passive subdomain enumeration tool for bug-bounty hunters & penetration testers.☆12Jan 10, 2021Updated 5 years ago
- ☆61Oct 24, 2025Updated 4 months ago
- ☆17Oct 15, 2017Updated 8 years ago
- Haxmas-2017 LD_PRELOAD rootkit in Golang☆19Dec 28, 2017Updated 8 years ago