adulau / the-art-of-pivotingView external linksLinks
The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World
☆157Dec 31, 2025Updated last month
Alternatives and similar repositories for the-art-of-pivoting
Users that are interested in the-art-of-pivoting are comparing it to the libraries listed below
Sorting:
- Cyber Threat Intelligence☆74Dec 7, 2025Updated 2 months ago
- Incident Response automation scripts☆16Sep 5, 2025Updated 5 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Jul 4, 2025Updated 7 months ago
- ☆23Mar 17, 2024Updated last year
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- ☆30Mar 3, 2021Updated 4 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated 10 months ago
- Python emulator for Excel XLM macros.☆18May 25, 2020Updated 5 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 9 months ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆52Sep 24, 2025Updated 4 months ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated 3 weeks ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- ☆27Nov 26, 2024Updated last year
- ☆102Dec 9, 2025Updated 2 months ago
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- win32json Parser for TypeLibrary creation☆12Feb 10, 2022Updated 4 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆19May 9, 2025Updated 9 months ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Hunt the windows Registry automatically using VQL☆13Jan 6, 2026Updated last month
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆116Oct 29, 2024Updated last year
- A scanner for taking basic fingerprints☆50Oct 1, 2020Updated 5 years ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- ☆12Jun 29, 2021Updated 4 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Automatically created C2 Feeds☆661Updated this week
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated last month
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- Lists of not-suitable-for-work words as YARA rules☆29Feb 2, 2026Updated 2 weeks ago
- Script to chain search parameters for MalwareBazaar☆12Jan 26, 2025Updated last year
- a scaling framework for tor traffic balancing 🧦 🧅 ⚖️☆15Nov 10, 2025Updated 3 months ago
- yaa - yaml search for humans☆12Dec 8, 2025Updated 2 months ago