darkweb-monitoring / dark-web-monitoringLinks
This post offers a technical comparison of dark web monitoring providers, focusing on Webz.io, CyberSixGill, and DarkOwl. It highlights Webz.io's advantages in source discovery, data quality, and customer support, making it the top choice for enhancing cyber threat intelligence.
β21Updated last year
Alternatives and similar repositories for dark-web-monitoring
Users that are interested in dark-web-monitoring are comparing it to the libraries listed below
Sorting:
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.β495Updated last week
- π΄ββ οΈπ° Another Ransomware gang trackerβ290Updated 2 weeks ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.β435Updated 4 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β508Updated 2 weeks ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.β415Updated 8 months ago
- Security Operations Chefβ54Updated 2 weeks ago
- Linux Security Audit Toolβ30Updated 8 months ago
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.β203Updated 2 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!β273Updated 7 months ago
- A curated list of Awesome Threat Intelligence Blogsβ487Updated 2 weeks ago
- β220Updated last year
- A curated list of Awesome Threat Intelligence blogsβ97Updated 2 years ago
- PowerShell tools to help defenders hunt smarter, hunt harder.β453Updated 3 months ago
- HookPhish is a Python script designed to aid in the detection of phishing websitesβ40Updated 2 years ago
- Open Source Security Operations Center Documentationβ207Updated 7 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multipleβ¦β743Updated last year
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident responseβ408Updated 2 years ago
- LotL RMMβ286Updated last week
- β192Updated last year
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contrβ¦β246Updated 2 weeks ago
- A tool for mapping cyber crimeβ236Updated last week
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evictβ¦β156Updated 2 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboardβ86Updated last month
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.β471Updated 4 months ago
- Playbooks for SOC Analystsβ666Updated 3 years ago
- COMPLETE OSINT CHEAT-SHEETβ120Updated 3 months ago
- A production ready Dockered MISPβ315Updated 2 weeks ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra IDβ573Updated last month
- Make your keepass 2.x more secure.β60Updated 2 months ago
- SOCFortress CoPilotβ434Updated this week