ait-cs-IaaS / Taranis-NG
Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains a user portal for simple self asset management. Taranis NG was developed by SK-CERT with a help from wide CSIRT community.
☆10Updated last year
Alternatives and similar repositories for Taranis-NG:
Users that are interested in Taranis-NG are comparing it to the libraries listed below
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- ☆15Updated 3 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Open YARA scan- and search engine☆23Updated 2 months ago
- Configurable, Community driven, HTTP C2 Profile☆17Updated last month
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆10Updated last year
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated last month
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆13Updated last year
- Execute tasks across SSH hosts using random selection☆17Updated 5 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 7 months ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆22Updated 3 years ago
- Alpine hostapd-mana based RADIUS server☆10Updated last year
- ☆18Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Updated 2 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆17Updated 2 months ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Golang Shlyuz Implant Implementation☆12Updated 2 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Ansible role that Installs Mythic☆15Updated 10 months ago
- Kibana app for RedELK☆17Updated 2 years ago
- Machine Learning basics with phishing dataset☆11Updated 4 years ago