cyberimposters / rss-securityLinks
We are always looking for ways to leverage the Elastic Stack to add value to the Elastic and cybersecurity community.
☆30Updated last year
Alternatives and similar repositories for rss-security
Users that are interested in rss-security are comparing it to the libraries listed below
Sorting:
- Signature based honeypot detector tool written in Golang☆107Updated 10 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Updated 3 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆73Updated this week
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆152Updated 2 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆60Updated 3 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆296Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- ☆61Updated last week
- Knowledge base on cybercriminal concealment techniques☆92Updated 8 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- Data from Dark Web Marketplace scraping - Be careful☆43Updated last year
- MISP Playbooks☆222Updated 3 months ago
- Traps web spiders☆79Updated 5 years ago
- ☆25Updated 3 years ago
- firedrill is a malware simulation harness for evaluating your security controls☆198Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 3 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆56Updated 3 months ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Updated 2 years ago
- Repo to hold wazuh manager mcp server☆71Updated 4 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Updated 11 months ago
- ☆192Updated last year
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆204Updated 2 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆285Updated last week
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated last month
- Generates logs of typical formats that would often be found in a SOC.☆41Updated 2 years ago
- ☆30Updated 2 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆191Updated last month
- Mapping of open-source detection rules and atomic tests.☆193Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆50Updated 7 months ago
- An index of publicly available and open-source threat detection rulesets.☆131Updated 9 months ago