danieldonda / Cyber-Threat-IntelligenceLinks
Compartilhamento de informação sobre ameaças e recursos de pesquisa
☆23Updated 2 years ago
Alternatives and similar repositories for Cyber-Threat-Intelligence
Users that are interested in Cyber-Threat-Intelligence are comparing it to the libraries listed below
Sorting:
- Explore CVE 2023-30845 automatically across multiple subdomains☆16Updated 2 years ago
- ☆19Updated 6 months ago
- Enumeração de Usuário☆57Updated 5 months ago
- ☆66Updated 4 years ago
- ☆19Updated 4 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- Some of my presentations and published articles in different conferences☆18Updated 4 years ago
- ☆16Updated 3 months ago
- MalDev & AV-EDR Evasion for Pentesters☆20Updated 2 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- Compilation of scripts/tools (made by me or not) that help me with Pentest and Bug Bounty.☆26Updated 2 weeks ago
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆18Updated 2 weeks ago
- Open IOC sharing platform☆65Updated last week
- Offensive V Programming☆18Updated 4 years ago
- Colored Cat is a syntax highlighter file reader.☆15Updated last year
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15Updated last year
- Virus Total Free - IOC parser and report generator☆24Updated 2 years ago
- ☆67Updated 2 years ago
- Counter Surveillance and OPSEC research☆104Updated 9 months ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆45Updated 3 years ago
- ☆45Updated 4 years ago
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Updated last year
- Repository for archiving Cobalt Strike configuration☆35Updated 2 weeks ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Resources for AD penetration testing and security☆33Updated 3 years ago
- ☆29Updated 8 months ago
- Malware and malicious applications database☆38Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- OWASP Foundation Web Respository☆10Updated 3 months ago