cyberimposters / rss-securityLinks
We are always looking for ways to leverage the Elastic Stack to add value to the Elastic and cybersecurity community.
☆29Updated last year
Alternatives and similar repositories for rss-security
Users that are interested in rss-security are comparing it to the libraries listed below
Sorting:
- Signature based honeypot detector tool written in Golang☆106Updated 7 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆58Updated 3 weeks ago
- Data from Dark Web Marketplace scraping - Be careful☆41Updated last year
- Building a consolidated RSS feed for articles about cyberattacks☆72Updated this week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆53Updated 2 weeks ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆150Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆299Updated last year
- ☆52Updated 2 months ago
- Mapping of open-source detection rules and atomic tests.☆183Updated 9 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆183Updated 9 months ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆58Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆72Updated last year
- MISP Playbooks☆216Updated 3 weeks ago
- firedrill is a malware simulation harness for evaluating your security controls☆194Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆125Updated 2 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆131Updated last year
- Automated threat intel feed parsing and consolidation💻👾🤖☆35Updated this week
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 4 months ago
- ☆19Updated 4 years ago
- 🏴☠️💰 Another Ransomware gang tracker☆264Updated last month
- Automation tool for Windows Deception Host Burn-In☆86Updated 11 months ago
- ☆60Updated this week
- Knowledge base on cybercriminal concealment techniques☆80Updated 6 months ago
- ☆75Updated 7 months ago
- LOKI2 - Simple IOC and YARA Scanner☆103Updated 4 months ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆19Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆199Updated last year
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆164Updated last month
- Traps web spiders☆76Updated 5 years ago