cogsec-collaborative / documentation
Books, advice notes, and useful lists, written for people running and working on disinformation deployments
☆12Updated 4 years ago
Alternatives and similar repositories for documentation:
Users that are interested in documentation are comparing it to the libraries listed below
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆32Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆16Updated 2 months ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- ☆12Updated 3 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- ☆24Updated 2 years ago
- RTAA-72, is CVCIO's real-time intelligence dashboard for Twitter☆21Updated 2 years ago
- Hashes of infamous malware☆26Updated last year
- ☆19Updated 2 years ago
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆17Updated 2 years ago
- Can you pay the ransom in your country?☆14Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 3 months ago
- Automatic detection engineering technical state compliance☆55Updated 10 months ago
- Convert Wigle.net result from json to Kml☆15Updated 4 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆29Updated 4 months ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Updated 2 years ago
- ☆18Updated 6 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆13Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- Surface Analysis System on Cloud☆19Updated last year
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Updated 2 years ago
- Repository for LNK stuff☆30Updated 2 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ☆15Updated 3 years ago