cogsec-collaborative / documentation
Books, advice notes, and useful lists, written for people running and working on disinformation deployments
☆12Updated 4 years ago
Alternatives and similar repositories for documentation:
Users that are interested in documentation are comparing it to the libraries listed below
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- External twitter feeder for AIL framework☆16Updated last year
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆15Updated last month
- Hashes of infamous malware☆25Updated last year
- Automatic detection engineering technical state compliance☆54Updated 8 months ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 9 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated last year
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- Can you pay the ransom in your country?☆13Updated last year
- External telegram feeder for AIL framework☆13Updated last month
- A quick reference guide for python script development in DFIR☆16Updated 11 months ago
- ☆11Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- ☆24Updated 2 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated last month
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆37Updated last year
- Collection of videos of Raids on Cybercriminals☆18Updated 5 months ago
- Penguin OS Forensic (or Flight) Recorder☆39Updated 2 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- RTAA-72, is CVCIO's real-time intelligence dashboard for Twitter☆21Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- Sniffing out well-known threat groups☆28Updated 7 months ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 6 months ago