ail-project / ail-frameworkLinks
AIL framework - Analysis Information Leak framework
☆796Updated last week
Alternatives and similar repositories for ail-framework
Users that are interested in ail-framework are comparing it to the libraries listed below
Sorting:
- A query aggregator for OSINT based threat hunting☆910Updated last week
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆1,002Updated last week
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆884Updated 3 months ago
- Zeek-Formatted Threat Intelligence Feeds☆377Updated this week
- Digital Forensics Investigation Platform☆848Updated 11 months ago
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆553Updated last month
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆942Updated last year
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆730Updated 3 weeks ago
- Purple Team Exercise Framework☆739Updated last year
- Yet another Ransomware gang tracker☆497Updated this week
- This project is a SIEM with SIRP and Threat Intel, all in one.☆463Updated 10 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆606Updated last month
- Extract and aggregate threat intelligence.☆885Updated last year
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆593Updated this week
- OpenCTI Connectors☆477Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆710Updated 8 months ago
- A modular OSINT honeypot for blue teamers☆340Updated 2 years ago
- A collective list of public APIs for use in security. Contributions welcome☆943Updated 2 months ago
- An application to analyze the EML file☆295Updated 2 weeks ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆689Updated 5 months ago
- ThePhish: an automated phishing email analysis tool☆1,273Updated last year
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆684Updated last month
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆372Updated this week
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆667Updated 2 years ago
- SIEM Tactics, Techiques, and Procedures☆667Updated 2 months ago
- A curated list of Awesome Threat Intelligence Blogs☆450Updated 2 months ago
- Collaborative Incident Response platform☆1,282Updated this week
- A knowledge base of actionable Incident Response techniques☆650Updated 3 years ago
- Ransomware leak site monitoring☆316Updated 3 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆630Updated last year