curated-intel / Ukraine-Cyber-OperationsLinks
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
☆935Updated 2 years ago
Alternatives and similar repositories for Ukraine-Cyber-Operations
Users that are interested in Ukraine-Cyber-Operations are comparing it to the libraries listed below
Sorting:
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆614Updated 3 years ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,517Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆691Updated 6 months ago
- A query aggregator for OSINT based threat hunting☆914Updated 3 weeks ago
- Collect information of Windows PC when doing incident response☆252Updated 2 years ago
- ☆434Updated 3 years ago
- A special DOS application to stop pro-Russian aggression websites. Support Ukraine!☆445Updated 3 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,063Updated 4 years ago
- NMAP Vulnerability Scanning Scripts☆628Updated 3 years ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,195Updated 5 months ago
- Detector for Log4Shell exploitation attempts☆729Updated 3 years ago
- OSINT tool - gets data from services like shodan, censys etc. in one app☆651Updated 2 years ago
- Incident Response Methodologies 2022☆1,078Updated 6 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆737Updated this week
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆1,051Updated this week
- Set of Mindmaps providing a detailed overview of the different #Microsoft auditing capacities for Windows, Exchange, Azure,...☆1,086Updated last year
- ☆538Updated last month
- Digital Forensics Investigation Platform☆854Updated last year
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,287Updated 2 years ago
- ThePhish: an automated phishing email analysis tool☆1,287Updated last year
- Gets updates from various clearnet domains and ransomware threat actor domains☆405Updated last year
- Collaborative Incident Response platform☆1,304Updated this week
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆773Updated 4 months ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆789Updated 3 years ago
- Fetch information about a public Google document.☆975Updated last year
- Bash script to check if a domain or list of domains can be spoofed based in DMARC records☆334Updated 3 years ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,068Updated 4 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,018Updated 4 months ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆567Updated 2 months ago
- Ransomware leak site monitoring☆316Updated 3 years ago