Compartilhamento de informação sobre ameaças e recursos de pesquisa
☆23Jan 26, 2023Updated 3 years ago
Alternatives and similar repositories for Cyber-Threat-Intelligence
Users that are interested in Cyber-Threat-Intelligence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple C program to demonstrate a Buffer Overflow.☆12Jul 31, 2021Updated 4 years ago
- ☆17Sep 2, 2021Updated 4 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆19Jun 22, 2022Updated 3 years ago
- Automate Nuclei scans and streamline bug hunting workflows☆21Feb 16, 2024Updated 2 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Explorando Remote Desktop do Windows Server 2003 com o exploit Esteemaudit (MS12-020) e obtendo RCE (sem Metasploit)☆20Feb 28, 2023Updated 3 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 5 months ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- ☆12Apr 21, 2019Updated 7 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- ☆41Apr 5, 2025Updated last year
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆30Jun 7, 2023Updated 2 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- ☆19Aug 2, 2020Updated 5 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 7 years ago
- Attempt to replicate the functions of auto_rip by Corey Harrell in Python.☆12Aug 4, 2024Updated last year
- Library for Windows XML Event Log (EVTX) data types☆18Dec 17, 2025Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆17Aug 10, 2022Updated 3 years ago
- Orchestrate web crawlers to create structured datasets from multiple data sources with YAML configs.☆16Dec 8, 2022Updated 3 years ago
- This script is to build Wazuh 4.3 environment☆12May 30, 2022Updated 3 years ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Jan 10, 2024Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆33Apr 13, 2022Updated 4 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- A simple web scraper using Python, Selenium, and requests-html to grab screenshots of google ads landing pages☆15Apr 24, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆63Apr 11, 2026Updated 3 weeks ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- Basically the C programming language peppered with my preferences☆12Jun 12, 2025Updated 10 months ago
- study material used for the 2018 CISSP exam☆11May 20, 2019Updated 6 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Jul 7, 2021Updated 4 years ago
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago