curated-intel / Ukraine-Cyber-Operations
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
☆918Updated last year
Alternatives and similar repositories for Ukraine-Cyber-Operations:
Users that are interested in Ukraine-Cyber-Operations are comparing it to the libraries listed below
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆602Updated 2 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆629Updated 4 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,423Updated 6 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,368Updated 10 months ago
- Incident Response Methodologies 2022☆1,020Updated 11 months ago
- A query aggregator for OSINT based threat hunting☆874Updated this week
- OSINT from your favorite services in a friendly terminal user interface - integrations for Virustotal, Shodan, and Censys☆1,001Updated 4 months ago
- a drop-in replacement for Nmap powered by shodan.io☆2,955Updated 9 months ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 2 years ago
- Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …☆1,727Updated last year
- Collaborative Incident Response platform☆1,117Updated this week
- GitHub Data Analysis Framework.☆1,829Updated 7 months ago
- Free hands-on digital forensics labs for students and faculty☆1,695Updated this week
- Bash script to check if a domain or list of domains can be spoofed based in DMARC records☆322Updated 2 years ago
- Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.☆878Updated last week
- A special DOS application to stop pro-Russian aggression websites. Support Ukraine!☆447Updated 2 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆837Updated 3 years ago
- Collect information of Windows PC when doing incident response☆243Updated last year
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆634Updated 3 months ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆1,952Updated last month
- ☆476Updated this week
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆941Updated last year
- A DFIR tool written in Python.☆1,044Updated 3 years ago
- You didn't think I'd go and leave the blue team out, right?☆1,633Updated last year
- Automated Red Team Infrastructure deployement using Docker☆1,219Updated 2 years ago
- ☆535Updated 2 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,683Updated last year
- ThePhish: an automated phishing email analysis tool☆1,179Updated 5 months ago
- Fetch information about a public Google document.☆862Updated last year
- A curated list of tools related to Industrial Control System (ICS) security and Penetration Testing☆276Updated 3 years ago