catching-transparent-phish / phocaLinks
Tool to analyze and detect MITM phishing toolkits on the web.
☆83Updated 3 years ago
Alternatives and similar repositories for phoca
Users that are interested in phoca are comparing it to the libraries listed below
Sorting:
- Data visualization for blue teams☆126Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Updated 3 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆136Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
- Open Threat Hunting Framework☆121Updated 2 years ago
- A tool designed to hunt for Phishing Kit source code☆228Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆265Updated last year
- A home for detection content developed by the delivr.to team☆73Updated 3 months ago
- A list of RMMs designed to be used in automation to build alerts☆114Updated last week
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆70Updated last month
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 7 months ago
- ☆96Updated 6 months ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆170Updated 3 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆140Updated 2 years ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97Updated 2 years ago
- Forensic Artifact Collection Tool Matrix☆91Updated last year
- This repository contains procedures found in the Feb 2022 conti leaks. They were taken from the "manual_teams_c" rocketchat channel in th…☆87Updated 3 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆75Updated 3 months ago
- Active Directory Purple Team Playbook☆113Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 6 months ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Updated 3 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- Memory Forensic System on Cloud☆92Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆150Updated 2 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆79Updated 5 months ago
- A browser extension and API server for detecting corporate password use on external websites☆94Updated 2 months ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆188Updated 3 years ago