bioniccyber / SocialMediaIntel
A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords/phrases.
☆20Updated 4 years ago
Related projects: ⓘ
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 6 months ago
- ☆27Updated last week
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆53Updated 3 weeks ago
- Can you pay the ransom in your country?☆13Updated 9 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆52Updated 3 months ago
- ☆22Updated 3 years ago
- This is a repository for the public blog with Labs indicators of compromise.☆10Updated 4 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆35Updated last year
- Home to the ActorTrackr source code☆27Updated 7 years ago
- ☆24Updated last year
- ☆22Updated last year
- Collection of scripts used to analyse malware or emails☆19Updated 3 years ago
- Useful commands for infosec☆28Updated last year
- Best practices in threat intelligence☆46Updated last year
- A MITRE ATT&CK Lookup Tool☆41Updated 4 months ago
- GreyNoise Maltego integration and transforms☆19Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆32Updated 7 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆74Updated 2 years ago
- Hashes of infamous malware☆24Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- Scan and decode NetWire logs☆11Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆107Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆21Updated 3 weeks ago
- A quick reference guide for python script development in DFIR☆14Updated 6 months ago
- Cybersecurity Incidents Mind Maps☆32Updated 2 years ago
- Setting up a training environment for MISP☆11Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆21Updated 7 months ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- ☆56Updated this week
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago