Open Source Threat Intelligence Chat Bot
☆321Mar 30, 2020Updated 6 years ago
Alternatives and similar repositories for CyBot
Users that are interested in CyBot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Java API for SSL\TLS scanning and reporting☆149Apr 2, 2026Updated last month
- ANWI - All New Wireless IDS☆29Aug 3, 2018Updated 7 years ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- ☆79Aug 4, 2022Updated 3 years ago
- Pre-OS microcode updater☆43Aug 25, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Burp extension to help developers replicate findings from pen tests☆70Jul 22, 2024Updated last year
- snake - a malware storage zoo☆217Jul 11, 2023Updated 2 years ago
- a CLI for ephemeral penetration testing☆17Dec 10, 2019Updated 6 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆211Nov 16, 2018Updated 7 years ago
- Android Automation Tool☆21May 9, 2018Updated 8 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,315Jan 22, 2025Updated last year
- Collecting & Hunting for IOCs with gusto and style☆242Aug 1, 2021Updated 4 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 11 months ago
- ☆14May 30, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- ☆137Mar 20, 2019Updated 7 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆557May 9, 2023Updated 3 years ago
- Puma Scan is a software security Visual Studio extension that provides real time, continuous source code analysis as development teams wr…☆448Oct 28, 2022Updated 3 years ago
- First IDE for Nmap Script (NSE) Development.☆360Aug 8, 2020Updated 5 years ago
- Platform Firmware Auditing Tool☆132Sep 7, 2018Updated 7 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 7 years ago
- DejaVU - Open Source Deception Framework☆428Aug 2, 2025Updated 9 months ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆165Mar 15, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆50Apr 11, 2026Updated last month
- 16,432 Free Yara rules created by☆389Jun 1, 2019Updated 6 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,176Apr 22, 2026Updated 3 weeks ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- Open source Active Directory security audit framework.☆138Jan 15, 2018Updated 8 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆291Apr 14, 2025Updated last year
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆426Updated this week
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- Extract and aggregate threat intelligence.☆910Jan 31, 2024Updated 2 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,284Nov 20, 2025Updated 6 months ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆214Jun 23, 2020Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- An information security preparedness tool to do adversarial simulation.☆1,139Apr 1, 2019Updated 7 years ago
- CLI tool for open source and threat intelligence☆1,275Apr 21, 2026Updated 3 weeks ago