curated-intel / Ukraine-Cyber-OperationsLinks
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
☆937Updated 2 years ago
Alternatives and similar repositories for Ukraine-Cyber-Operations
Users that are interested in Ukraine-Cyber-Operations are comparing it to the libraries listed below
Sorting:
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆616Updated 3 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆701Updated 9 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,529Updated last year
- A query aggregator for OSINT based threat hunting☆927Updated this week
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆589Updated last month
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆761Updated 2 months ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,075Updated 4 years ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,739Updated 2 years ago
- Digital Forensics Investigation Platform☆866Updated last year
- Incident Response Methodologies 2022☆1,100Updated 9 months ago
- ☆542Updated 4 months ago
- Collect information of Windows PC when doing incident response☆253Updated 2 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆412Updated last year
- Collaborative Incident Response platform☆1,367Updated this week
- OSINT tool - gets data from services like shodan, censys etc. in one app☆662Updated 2 years ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,113Updated this week
- Bash script to check if a domain or list of domains can be spoofed based in DMARC records☆333Updated 3 years ago
- ThePhish: an automated phishing email analysis tool☆1,314Updated last year
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Updated 3 years ago
- Ransomware leak site monitoring☆315Updated 3 years ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,043Updated 7 months ago
- A DFIR tool written in Python.☆1,054Updated 4 years ago
- Everything related to Linux Forensics☆714Updated 2 years ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,084Updated 7 months ago
- Cuckoo3 is a Python 3 open source automated malware analysis system.☆796Updated last month
- Sophos-originated indicators-of-compromise from published reports☆647Updated last week
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,203Updated last week
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆180Updated 4 years ago
- Extract and Visualize Data from URLs using Unfurl☆707Updated this week
- Yet another Ransomware gang tracker☆555Updated last week