curated-intel / Ukraine-Cyber-OperationsLinks
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
☆930Updated 2 years ago
Alternatives and similar repositories for Ukraine-Cyber-Operations
Users that are interested in Ukraine-Cyber-Operations are comparing it to the libraries listed below
Sorting:
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆616Updated 3 years ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,480Updated 11 months ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆676Updated 2 months ago
- A query aggregator for OSINT based threat hunting☆903Updated this week
- ThePhish: an automated phishing email analysis tool☆1,246Updated 11 months ago
- A special DOS application to stop pro-Russian aggression websites. Support Ukraine!☆447Updated 3 years ago
- Collaborative Incident Response platform☆1,214Updated this week
- Incident Response Methodologies 2022☆1,063Updated 3 months ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆733Updated 3 weeks ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆551Updated 11 months ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆935Updated last week
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,180Updated 2 months ago
- Digital Forensics Investigation Platform☆833Updated 9 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆981Updated 3 weeks ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,731Updated last year
- Gets updates from various clearnet domains and ransomware threat actor domains☆398Updated last year
- Collect information of Windows PC when doing incident response☆252Updated 2 years ago
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆820Updated 3 weeks ago
- ☆528Updated last month
- NMAP Vulnerability Scanning Scripts☆629Updated 3 years ago
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,948Updated last year
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆703Updated last month
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,272Updated 2 years ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆646Updated 2 years ago
- Bash script to check if a domain or list of domains can be spoofed based in DMARC records☆330Updated 3 years ago
- A curated list of tools related to Industrial Control System (ICS) security and Penetration Testing☆310Updated 3 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- Ransomware leak site monitoring☆313Updated 3 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,188Updated 3 weeks ago
- Extract and Visualize Data from URLs using Unfurl☆679Updated last week