cyberimposters / rss-security
We are always looking for ways to leverage the Elastic Stack to add value to the Elastic and cybersecurity community.
☆25Updated last year
Alternatives and similar repositories for rss-security:
Users that are interested in rss-security are comparing it to the libraries listed below
- Signature based honeypot detector tool written in Golang☆89Updated last week
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆48Updated 2 months ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆52Updated 2 years ago
- SANS has a massive list of posters available for quick reference to aid you in your security learning.☆18Updated 3 years ago
- LOKI2 - Simple IOC and YARA Scanner☆88Updated 8 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 5 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆14Updated 4 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆78Updated last week
- MISP Playbooks☆189Updated last month
- This is a collection of threat detection rules / rules engines that I have come across.☆283Updated 10 months ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated 10 months ago
- Graphical map of known Advanced Persistent Threats☆53Updated last week
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated 2 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- Security Operation Center Lab☆18Updated 5 months ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆150Updated last year
- Open-source Fabric templates for cybersecurity and compliance☆16Updated 2 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆67Updated this week
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated last week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- Repository of tools and resources for analyzing Docker containers☆63Updated last year
- IOCs from Google's Threat Analysis Group (TAG)☆29Updated 3 months ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆9Updated 4 years ago
- ☆53Updated this week
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆10Updated 10 months ago
- Traps web spiders☆70Updated 4 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆68Updated 9 months ago