cogsec-collaborative / documentationLinks
Books, advice notes, and useful lists, written for people running and working on disinformation deployments
☆12Updated 4 years ago
Alternatives and similar repositories for documentation
Users that are interested in documentation are comparing it to the libraries listed below
Sorting:
- Links to resources on misinformation, disinformation, fake news, whatever it's called this week☆53Updated 3 years ago
- Website crawler with YARA detection☆88Updated last year
- External twitter feeder for AIL framework☆16Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 4 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆38Updated last year
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Yara Based Detection Engine for web browsers☆49Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated last year
- A set of scripts and analysis commands to harvest Tweets and identify content of interest, meaningful search criteria, and value keywords…☆20Updated 5 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- RTAA-72, is CVCIO's real-time intelligence dashboard for Twitter☆21Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆32Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 9 months ago
- URL fingerprinting made easy☆86Updated last year
- ☆24Updated 2 years ago
- ☆66Updated 5 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆47Updated 3 years ago
- Yara rules☆22Updated 2 years ago
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆27Updated 4 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- ☆15Updated 3 years ago
- Yara rules for malicious javascript files from public repositories or written by me.☆13Updated 3 years ago
- External telegram feeder for AIL framework☆13Updated last month
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 5 months ago
- Hashes of infamous malware☆26Updated last year
- A mapping project between tags (annotations, labels) and domain names☆11Updated last year
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆17Updated 3 years ago