Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.
☆92Apr 15, 2019Updated 6 years ago
Alternatives and similar repositories for BreachNotes
Users that are interested in BreachNotes are comparing it to the libraries listed below
Sorting:
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Jul 24, 2015Updated 10 years ago
- A tool to harvest credentials from leaked data dump☆85Dec 7, 2021Updated 4 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- DRAFT STIX specification documents for version 1.2☆20Oct 3, 2016Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Oct 14, 2020Updated 5 years ago
- A Docker container that exposes tlspretense on a port.☆19Mar 24, 2023Updated 2 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Generates GeoJSON for website map☆11Sep 23, 2018Updated 7 years ago
- Open FAIR Course☆13Feb 4, 2020Updated 6 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- A simple tool for bulk adding/updating/removing tags from AWS resources.☆13Jan 8, 2016Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆22Jan 28, 2019Updated 7 years ago
- Bringing DevOps to Forensics☆34Feb 4, 2015Updated 11 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Nov 18, 2015Updated 10 years ago
- ☆12May 8, 2020Updated 5 years ago
- OSSEC HIDS - Sucuri Fork☆11Feb 12, 2021Updated 5 years ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- Ruby BlackBag. Misc ruby-based pen-testing/reversing tools. Inspired by Matasano BlackBag.☆148Jun 17, 2025Updated 8 months ago
- Enrich a host with open source security information☆27Oct 4, 2015Updated 10 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Jun 12, 2017Updated 8 years ago
- Small scripts for doing repeatable tasks☆25Apr 30, 2022Updated 3 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- Command Line STDOUT Colorer☆30Jul 27, 2021Updated 4 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 13 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- ☆113Jun 12, 2017Updated 8 years ago