cybercdh / kitphishr
A tool designed to hunt for Phishing Kit source code
☆213Updated last year
Related projects: ⓘ
- Awesome VirusTotal Intelligence Search Queries☆325Updated last year
- A python script developed to process Windows memory images based on triage type.☆259Updated 9 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆266Updated 3 weeks ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆191Updated 3 years ago
- Ransomware leak site monitoring☆307Updated 2 years ago
- ☆139Updated this week
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆143Updated 11 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆192Updated 2 years ago
- Misc Threat Hunting Resources☆368Updated last year
- ☆167Updated this week
- A phishing kit collector for scavengers☆190Updated last week
- Repository of public reference frameworks for the DFIR community.☆105Updated last year
- An application to analyze the EML file☆264Updated 2 months ago
- Detection Ideas & Rules repository.☆178Updated 3 years ago
- Repository of attack and defensive information for Business Email Compromise investigations☆216Updated 3 weeks ago
- ATTPwn☆207Updated 6 months ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆173Updated last year
- A GeoIP lookup utility utilizing ipinfo.io services.☆83Updated 9 months ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆216Updated 2 years ago
- A modular OSINT honeypot for blue teamers☆325Updated last year
- A list of my personal projects☆166Updated 2 years ago
- Threat Hunting & Incident Investigation with Osquery☆197Updated 2 years ago
- Automagically extract forensic timeline from volatile memory dump☆123Updated 4 months ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆235Updated this week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆154Updated 10 months ago
- Threat-Intelligence Feeds & Tools & Frameworks☆211Updated 3 months ago
- MISP Playbooks☆167Updated last month
- ☆185Updated last year
- Live forensic artifacts collector☆157Updated 2 months ago