cogsec-collaborative / documentation
Books, advice notes, and useful lists, written for people running and working on disinformation deployments
☆12Updated 3 years ago
Alternatives and similar repositories for documentation:
Users that are interested in documentation are comparing it to the libraries listed below
- GreyNoise Maltego integration and transforms☆20Updated last year
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 3 years ago
- Forensic Imaging quickstarts!☆13Updated 2 years ago
- Hashes of infamous malware☆25Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- Can you pay the ransom in your country?☆13Updated last year
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆18Updated 3 months ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- External telegram feeder for AIL framework☆13Updated 2 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆21Updated 11 months ago
- RTAA-72, is CVCIO's real-time intelligence dashboard for Twitter☆21Updated 2 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 3 years ago
- Collection of IoCs available and related to attacks on ESXi infrastructures that occurred as of Friday February 3, 2023.☆12Updated last year
- ☆17Updated last year
- ☆42Updated 2 years ago
- Links to resources on misinformation, disinformation, fake news, whatever it's called this week☆52Updated 2 years ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆17Updated 2 years ago
- VirusTotal Intelligence Search☆35Updated 4 years ago
- reveal origins behind reverse proxies & hidden services 👀 🧅 💻☆28Updated last year
- ☆22Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 8 months ago
- A collaboration effort by the DFIR community to provide definitions (sometimes multiple) for common forensic terms!☆26Updated 2 years ago
- URL fingerprinting made easy☆82Updated 9 months ago
- ☆27Updated last week
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆15Updated 9 months ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆45Updated 2 years ago
- ☆23Updated 2 years ago