curated-intel / Ukraine-Cyber-Operations
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
☆926Updated last year
Alternatives and similar repositories for Ukraine-Cyber-Operations:
Users that are interested in Ukraine-Cyber-Operations are comparing it to the libraries listed below
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆610Updated 3 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆656Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,449Updated 8 months ago
- Digital Forensics Investigation Platform☆816Updated 6 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆664Updated 5 months ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆962Updated last week
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆544Updated 8 months ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆908Updated last week
- Collaborative Incident Response platform☆1,181Updated this week
- A DFIR tool written in Python.☆1,047Updated 3 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 2 years ago
- A query aggregator for OSINT based threat hunting☆889Updated 2 weeks ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,712Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆1,992Updated last week
- API Security Project aims to present unique attack & defense methods in API Security field☆1,381Updated last year
- Extract and Visualize Data from URLs using Unfurl☆666Updated last month
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,861Updated last year
- Bash script to check if a domain or list of domains can be spoofed based in DMARC records☆328Updated 3 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆783Updated 2 years ago
- A concise, directive, specific, flexible, and free incident response plan template☆699Updated 11 months ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,393Updated 7 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,262Updated last year
- Indicators of Compromise from Amnesty International's cyber investigations☆1,590Updated 4 months ago
- A special DOS application to stop pro-Russian aggression websites. Support Ukraine!☆446Updated 2 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,177Updated 3 weeks ago
- Leaked pentesting manuals given to Conti ransomware crooks☆983Updated 3 years ago
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆521Updated 2 years ago
- Everything related to Linux Forensics☆695Updated last year
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,174Updated 3 months ago
- List of regex for scraping secret API keys and juicy information.☆702Updated 2 years ago