ait-cs-IaaS / Taranis-NG
Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains a user portal for simple self asset management. Taranis NG was developed by SK-CERT with a help from wide CSIRT community.
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Taranis-NG
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Automate the regular transfer of AIS data into a MISP Server☆6Updated 5 months ago
- Can you pay the ransom in your country?☆14Updated 11 months ago
- DFF (Digital Forensics Framework)☆10Updated 3 years ago
- External telegram feeder for AIL framework☆13Updated last week
- Scripts to deploy and update MISP in air-gapped environments☆16Updated 3 months ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆16Updated last month
- Tricard - Malware Sandbox Fingerprinting☆19Updated 11 months ago
- Python CLI and module for CIRCL hash lookup☆12Updated last month
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated last month
- Yara rules for malicious javascript files from public repositories or written by me.☆12Updated 3 years ago
- Hacky linux memory probe. Yara or Regex scan process memory☆11Updated 8 months ago
- Golang Shlyuz Implant Implementation☆12Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆21Updated 3 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- ☆15Updated 4 months ago
- Detect and remove the presence of canary tokens☆19Updated 11 months ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Updated 2 years ago
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆11Updated 2 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated 9 months ago
- ☆17Updated 8 months ago
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆19Updated this week
- ☆22Updated 3 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 7 months ago
- Catalog Red Team techniques that cause popups in various macOS versions☆14Updated this week
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆14Updated last year
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆19Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 2 months ago