ail-project / ail-feeder-telegram
External telegram feeder for AIL framework
☆13Updated 2 weeks ago
Alternatives and similar repositories for ail-feeder-telegram
Users that are interested in ail-feeder-telegram are comparing it to the libraries listed below
Sorting:
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- A mini project to exfiltrate data via QR codes☆19Updated last month
- An extension of the sigma standard to include security metrics.☆15Updated last year
- ☆22Updated 4 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 9 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Updated 5 months ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- ☆28Updated last year
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- ☆24Updated 2 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- Penguin OS Forensic (or Flight) Recorder☆40Updated 4 months ago
- Searching .evtx logs for remote connections☆23Updated last year
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- ☆12Updated 4 years ago
- ☆17Updated 9 months ago
- Hashes of infamous malware☆26Updated last year
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Extract credentials from lsass remotely☆16Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 3 months ago
- ☆32Updated 2 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated this week