burritoblue / attck4fraudLinks
Principles of MITRE ATT&CK in the fraud domain
☆34Updated 6 years ago
Alternatives and similar repositories for attck4fraud
Users that are interested in attck4fraud are comparing it to the libraries listed below
Sorting:
- For storing of the volumes☆4Updated 5 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 6 years ago
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- GreyNoise Maltego integration and transforms☆20Updated 2 years ago
- ☆30Updated 6 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- CrowdStrike Threat Intelligence☆36Updated 2 years ago
- A tool designed to traverse phishing URL paths to search for phishing kit source code.☆91Updated 2 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Aktaion is a machine learning open source & active defense (orchestration) prototype. The tool focuses on the detection of exploits based…☆49Updated last year
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- ☆76Updated 7 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 4 months ago
- Site for IWS book content☆18Updated 6 years ago
- A toolkit for Security Researchers☆127Updated 5 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆61Updated 9 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 2 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆59Updated 3 weeks ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago