curated-intel / Ukraine-Cyber-Operations
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
☆926Updated last year
Alternatives and similar repositories for Ukraine-Cyber-Operations
Users that are interested in Ukraine-Cyber-Operations are comparing it to the libraries listed below
Sorting:
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆611Updated 3 years ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,384Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆658Updated 3 weeks ago
- Tracking interesting Linux (and UNIX) malware. Send PRs☆1,175Updated last week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,456Updated 9 months ago
- A query aggregator for OSINT based threat hunting☆894Updated this week
- Incident Response Methodologies 2022☆1,049Updated last month
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆545Updated 9 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆671Updated 6 months ago
- ThePhish: an automated phishing email analysis tool☆1,223Updated 9 months ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆717Updated this week
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆918Updated 3 weeks ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 2 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,025Updated 3 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆970Updated last month
- Collect information of Windows PC when doing incident response☆253Updated last year
- Collaborative Incident Response platform☆1,187Updated this week
- OSINT tool - gets data from services like shodan, censys etc. in one app☆645Updated 2 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆805Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,016Updated last week
- ☆514Updated this week
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,032Updated last month
- Tools & Interesting Things for RedTeam Ops☆2,192Updated 2 years ago
- Digital Forensics Investigation Platform☆820Updated 7 months ago
- Everything related to Linux Forensics☆697Updated last year
- Bash script to check if a domain or list of domains can be spoofed based in DMARC records☆329Updated 3 years ago
- Ransomware leak site monitoring☆312Updated 3 years ago
- Open Source Package Analysis☆833Updated last month
- A knowledge base of actionable Incident Response techniques☆635Updated 2 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,179Updated last month