cybershujin / Threat-Actors-use-of-Artifical-IntelligenceView external linksLinks
☆286Aug 30, 2025Updated 5 months ago
Alternatives and similar repositories for Threat-Actors-use-of-Artifical-Intelligence
Users that are interested in Threat-Actors-use-of-Artifical-Intelligence are comparing it to the libraries listed below
Sorting:
- ☆54Nov 23, 2024Updated last year
- A resource containing all the tools each ransomware gangs uses☆1,327Dec 24, 2025Updated last month
- Cyber Underground General Intelligence Requirements☆97Feb 2, 2024Updated 2 years ago
- Turn any blog into structured threat intelligence.☆52Updated this week
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 4 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Nov 11, 2025Updated 3 months ago
- Anvilogic Forge☆113Sep 18, 2025Updated 4 months ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,204Dec 29, 2025Updated last month
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆225Sep 4, 2024Updated last year
- A curated list of Awesome Threat Intelligence Blogs☆491Jan 20, 2026Updated 3 weeks ago
- Live Feed of C2 servers, tools, and botnets☆745Feb 9, 2026Updated last week
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Feb 9, 2026Updated last week
- Open KLara Project☆34Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆757Jan 28, 2025Updated last year
- Map tracking ransomware, by OCD World Watch team☆483Jan 21, 2026Updated 3 weeks ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Mar 7, 2025Updated 11 months ago
- ☆381Apr 18, 2024Updated last year
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,036Jan 11, 2026Updated last month
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- A POC to disable TamperProtection and other Defender / MDE components☆254Jun 6, 2024Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Feb 2, 2024Updated 2 years ago
- A curated list of annual cyber security reports☆993Updated this week
- ☆11Mar 12, 2021Updated 4 years ago
- A collection of methods to learn who the owner of an IP address is.☆224Sep 29, 2025Updated 4 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Dec 13, 2023Updated 2 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆633Aug 4, 2025Updated 6 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Sep 21, 2024Updated last year
- Living off the False Positive!☆41Jan 31, 2025Updated last year
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆245Mar 19, 2024Updated last year
- LLM Testing Findings Templates☆75Feb 14, 2024Updated 2 years ago
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,924Jan 20, 2026Updated 3 weeks ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆193Apr 14, 2024Updated last year