darkweb-monitoring / dark-web-monitoring
This post offers a technical comparison of dark web monitoring providers, focusing on Webz.io, CyberSixGill, and DarkOwl. It highlights Webz.io's advantages in source discovery, data quality, and customer support, making it the top choice for enhancing cyber threat intelligence.
☆17Updated 7 months ago
Alternatives and similar repositories for dark-web-monitoring:
Users that are interested in dark-web-monitoring are comparing it to the libraries listed below
- Honeypot Service Simulator☆23Updated 7 months ago
- Semi-automated bash scripts that provide security hardening for Linux, Debian based, 2024, attempts DISA STIG and CIS Compliance☆39Updated last month
- A collection of helpful resources related to Cybersecurity and a lot more.☆11Updated this week
- Analyze pcaps with Zeek and a Grafana Dashboard☆175Updated 11 months ago
- COMPLETE OSINT CHEAT-SHEET☆84Updated 2 months ago
- 🪟 Windows ➡️ A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during u…☆19Updated this week
- A curated list of Awesome Threat Intelligence Blogs☆390Updated 2 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆361Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆283Updated this week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆162Updated 2 months ago
- Automation tool for Windows Deception Host Burn-In☆85Updated 4 months ago
- A collection of sources of documentation and best practices to build and run a SOC☆51Updated 2 years ago
- Linux Security Audit Tool☆26Updated 8 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆192Updated 2 weeks ago
- A template for writing a condensed course index leveraging LaTeX indexing☆102Updated last month
- Traps web spiders☆71Updated 4 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆194Updated 3 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆103Updated 6 months ago
- A tool for mapping cyber crime☆136Updated last week
- A very opinionated list of security tools☆126Updated last month
- Customized CVE FEED Notifier☆110Updated this week
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆165Updated 3 weeks ago
- Web Server Vulnerability Scanning Tool☆35Updated last month
- DPULSE - Tool for complex approach to domain OSINT☆110Updated this week
- Deployment scripts and a simple reports for CIS benchmarks☆22Updated 2 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆237Updated last month
- A OSINT project that explores how to dump data from React☆26Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆350Updated 3 months ago
- Fully automated host & network intrusion detection platform. Detects malware from behavioural patterns rather than signatures and enables…☆132Updated last year
- ☆73Updated last month