andrewsmhay / BreachNotesLinks
Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.
☆93Updated 6 years ago
Alternatives and similar repositories for BreachNotes
Users that are interested in BreachNotes are comparing it to the libraries listed below
Sorting:
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Credential Phish Analysis and Automation☆97Updated 6 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆141Updated 2 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆66Updated 7 years ago
- Some IR notes☆73Updated 8 years ago
- ☆38Updated 6 years ago
- Multithreaded threat Intelligence gathering built with Python3☆175Updated 7 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- CrowdStrike Feed Management System. CrowdFMS is a framework for automating collection and processing of samples from VirusTotal, by lever…☆128Updated 6 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Hunting IOCs all day every day...☆86Updated last year
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆141Updated 6 years ago
- The Seeker of IOC☆129Updated 4 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 9 years ago
- Miscelaneous useful scripts for my day to day projects☆124Updated 4 years ago
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆91Updated 7 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Materials from my Circle City Con talk: Fantastic OSINT (and where to find it)☆23Updated 9 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆143Updated 2 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆52Updated 9 years ago