curated-intel / Ukraine-Cyber-Operations
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
☆910Updated last year
Related projects: ⓘ
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆586Updated 2 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆585Updated last month
- GitHub Data Analysis Framework.☆1,796Updated 2 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,335Updated 6 months ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,647Updated 11 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,395Updated last month
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆547Updated 2 months ago
- ThePhish: an automated phishing email analysis tool☆1,119Updated last month
- A query aggregator for OSINT based threat hunting☆855Updated this week
- Incident Response Methodologies 2022☆925Updated 7 months ago
- Free hands-on digital forensics labs for students and faculty☆1,547Updated 3 weeks ago
- Collaborative Incident Response platform☆1,031Updated this week
- a drop-in replacement for Nmap powered by shodan.io☆2,870Updated 5 months ago
- Bash script to check if a domain or list of domains can be spoofed based in DMARC records☆314Updated 2 years ago
- Collections of tools and methods created to aid in OSINT collection☆2,758Updated last year
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆849Updated last week
- Digital Forensics Investigation Platform☆758Updated last month
- Fetch information about a public Google document.☆820Updated 10 months ago
- A browser extension for OSINT search☆1,414Updated last week
- You didn't think I'd go and leave the blue team out, right?☆1,586Updated last year
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,596Updated 8 months ago
- List of regex for scraping secret API keys and juicy information.☆675Updated 2 years ago
- A special DOS application to stop pro-Russian aggression websites. Support Ukraine!☆449Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,344Updated last year
- Trace Labs OSINT Linux Distribution based on Kali.☆658Updated last year
- Granular, Actionable Adversary Emulation for the Cloud☆1,750Updated this week
- ☆537Updated this week
- Defences against Cobalt Strike☆1,270Updated 2 years ago
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,237Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,824Updated 11 months ago