danieldonda / Cyber-Threat-IntelligenceLinks
Compartilhamento de informação sobre ameaças e recursos de pesquisa
☆20Updated 2 years ago
Alternatives and similar repositories for Cyber-Threat-Intelligence
Users that are interested in Cyber-Threat-Intelligence are comparing it to the libraries listed below
Sorting:
- If you are interested in a live feed API, please contact us☆16Updated 4 months ago
- ☆64Updated 3 years ago
- Enumeração de Usuário☆52Updated 3 weeks ago
- ☆19Updated 2 months ago
- ☆19Updated 4 years ago
- ☆16Updated 2 years ago
- Compilation of scripts/tools (made by me or not) that help me with Pentest and Bug Bounty.☆27Updated 10 months ago
- MalDev & AV-EDR Evasion for Pentesters☆17Updated 2 years ago
- Python, C++ and Go☆22Updated 2 years ago
- An application to test windows and linux shellcodes☆92Updated 9 months ago
- Simple and efficient file shredding☆14Updated 5 years ago
- DNS over HTTPS targeted malware (only runs once)☆97Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- ☆42Updated 4 months ago
- Resources for AD penetration testing and security☆32Updated 3 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- Offensive V Programming☆18Updated 3 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- Some of my presentations and published articles in different conferences☆18Updated 3 years ago
- ☆19Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Tactics, Techniques, and Procedures☆25Updated 7 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆25Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆56Updated last year
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- this repo is for red team process and tools collection☆25Updated 4 years ago