cyberimposters / rss-security
We are always looking for ways to leverage the Elastic Stack to add value to the Elastic and cybersecurity community.
☆24Updated 11 months ago
Alternatives and similar repositories for rss-security:
Users that are interested in rss-security are comparing it to the libraries listed below
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆48Updated 2 years ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆47Updated this week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆136Updated this week
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated 11 months ago
- Graphical map of known Advanced Persistent Threats☆47Updated last year
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆15Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆38Updated 2 years ago
- Data from Dark Web Marketplace scraping - Be careful☆38Updated 2 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆42Updated 2 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆72Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆102Updated last year
- ☆32Updated 2 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆30Updated last week
- CarbonBlack EDR detection rules and response actions☆71Updated 4 months ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆53Updated 7 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆277Updated 8 months ago
- ☆86Updated 5 months ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆59Updated 8 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆64Updated 6 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆24Updated last month
- MISP Playbooks☆182Updated last month
- A PoC backdoor that uses Gmail as a C&C server☆12Updated 4 years ago
- LOKI2 - Simple IOC and YARA Scanner☆84Updated 5 months ago
- ☆49Updated this week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆80Updated last year
- ☆19Updated 2 years ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆178Updated 6 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆145Updated 4 months ago