Notebooks and code chunks for the Information Retrieval course
☆24May 7, 2023Updated 2 years ago
Alternatives and similar repositories for inforet
Users that are interested in inforet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated last week
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆24Dec 5, 2025Updated 3 months ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- Automating the baseline logging settings found here: https://nullsec.us/windows-baseline-logging/☆20Jan 28, 2025Updated last year
- Open Source Implementation of Cobalt Strike's Malleable C2☆96Jan 27, 2026Updated 2 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Telemetry for OpenClaw - Captures tool calls, LLM usage, agent lifecycle, and message events. Outputs to JSONL file and optionally to sys…☆70Mar 13, 2026Updated 2 weeks ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- Threat Intelligence Analysis workflows built with n8n and integrated in SecurityOnion☆33Nov 13, 2025Updated 4 months ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆73Updated this week
- ☆73Nov 7, 2025Updated 4 months ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆30Dec 1, 2023Updated 2 years ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆35Oct 21, 2025Updated 5 months ago
- Pipeline that allows sending forensic artifacts to OpenRelik for automatic processing☆42Jan 30, 2026Updated last month
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Mar 18, 2026Updated last week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 8 months ago
- Malware Analysis Exercise Samples and Resources☆57Mar 17, 2026Updated last week
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- ☆145Aug 7, 2025Updated 7 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆129Mar 14, 2026Updated last week
- Venture: Cross-Platform GUI tool for parsing and analyzing Windows event logs☆92Jan 23, 2025Updated last year
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Jan 16, 2025Updated last year
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- ☆164Jun 12, 2025Updated 9 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆107Dec 9, 2025Updated 3 months ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆122May 28, 2025Updated 9 months ago
- Python utility that generates "imageless" QR codes in various formats☆138Aug 10, 2024Updated last year
- Monitor your PingCastle scans to highlight the rule diff between two scans☆158Feb 19, 2026Updated last month
- Dettectinator - The Python library to your DeTT&CT YAML files.☆118Jan 22, 2026Updated 2 months ago
- Search Index Database Reporter☆132Oct 28, 2025Updated 4 months ago
- ☆125Mar 27, 2024Updated 2 years ago
- IOCs published by Black Lotus Labs☆136Mar 16, 2026Updated last week
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆127Apr 24, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆171Mar 20, 2026Updated last week
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆142Feb 25, 2024Updated 2 years ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆200Feb 23, 2026Updated last month
- Canary Detection☆193Oct 20, 2025Updated 5 months ago
- A collection of methods to learn who the owner of an IP address is.☆228Sep 29, 2025Updated 5 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago