andrewsmhay / BreachNotesLinks
Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.
☆93Updated 6 years ago
Alternatives and similar repositories for BreachNotes
Users that are interested in BreachNotes are comparing it to the libraries listed below
Sorting:
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆66Updated 7 years ago
- Multithreaded threat Intelligence gathering built with Python3☆175Updated 7 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆63Updated 9 years ago
- Some IR notes☆73Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆52Updated 9 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆141Updated 2 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆141Updated 6 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- The Seeker of IOC☆129Updated 4 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 4 years ago
- Repository for Endpoint Security Testing☆35Updated 7 years ago
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- Cyber Intel Management☆49Updated 7 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆145Updated 2 years ago
- CrowdStrike Feed Management System. CrowdFMS is a framework for automating collection and processing of samples from VirusTotal, by lever…☆128Updated 6 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆82Updated 9 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 9 years ago
- a Malware/Threat Analyst Desktop☆89Updated 10 years ago
- SANS Hunting on the Cheap☆35Updated 9 years ago
- ☆38Updated 7 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago