ail-project / ail-frameworkLinks
AIL framework - Analysis Information Leak framework
☆847Updated this week
Alternatives and similar repositories for ail-framework
Users that are interested in ail-framework are comparing it to the libraries listed below
Sorting:
- A query aggregator for OSINT based threat hunting☆925Updated 3 weeks ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,077Updated this week
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆925Updated 6 months ago
- Yet another Ransomware gang tracker☆544Updated last week
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆954Updated 2 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆754Updated last month
- Awesome list of keywords and artifacts for Threat Hunting sessions☆622Updated 4 months ago
- Extract and aggregate threat intelligence.☆892Updated last year
- Purple Team Exercise Framework☆753Updated last year
- Zeek-Formatted Threat Intelligence Feeds☆381Updated this week
- SIEM Tactics, Techiques, and Procedures☆684Updated 2 weeks ago
- OpenCTI Connectors☆497Updated this week
- Digital Forensics Investigation Platform☆864Updated last year
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆615Updated this week
- Ransomware leak site monitoring☆315Updated 3 years ago
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆573Updated 3 weeks ago
- This project is a SIEM with SIRP and Threat Intel, all in one.☆464Updated last year
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆731Updated 10 months ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆669Updated 2 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆702Updated last month
- A curated list of Awesome Threat Intelligence Blogs☆473Updated last week
- An application to analyze the EML file☆312Updated 3 weeks ago
- A knowledge base of actionable Incident Response techniques☆656Updated 3 years ago
- ☆513Updated last year
- 🏴☠️💰 Another Ransomware gang tracker☆271Updated 3 months ago
- A collective list of public APIs for use in security. Contributions welcome