Sniffing out well-known threat groups
☆64Aug 13, 2024Updated last year
Alternatives and similar repositories for Akamaru
Users that are interested in Akamaru are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Aug 13, 2024Updated last year
- AI-Powered Threat Intelligence MCP tool☆37Jul 18, 2025Updated 9 months ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- Golang Library to interact with your MISP instance☆22Sep 12, 2019Updated 6 years ago
- A reddit bot that scans ODs over at /r/OpenDirectories and submits the results to the ODCrawler discovery server☆11Jan 22, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 🦊 DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.☆51Jul 21, 2025Updated 9 months ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- Python Script to check website for username☆31May 4, 2025Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Beginners Guide to Hunting for Threats☆19Apr 26, 2025Updated last year
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆27Updated this week
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- ☆12Dec 7, 2022Updated 3 years ago
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆170Apr 11, 2026Updated 3 weeks ago
- A modern, real-time monitoring dashboard built with FastAPI and Svelte. This application demonstrates real-time data streaming using Serv…☆19Mar 31, 2025Updated last year
- osquery query packs☆14Aug 31, 2018Updated 7 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- ☆18May 6, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- Learning Python for Forensics, Second Edition, Published by Packt☆11Apr 5, 2019Updated 7 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Cross-platform username reconnaissance tool built for OSINT investigators, cyber threat analysts, red teamers, and CTF enthusiasts.☆131Aug 10, 2025Updated 8 months ago
- AIL project training materials☆39Apr 21, 2026Updated last week
- ☆38Jan 24, 2024Updated 2 years ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆106Jan 25, 2026Updated 3 months ago
- Script to check for CVE-2023-36884 hardening☆15Jul 18, 2023Updated 2 years ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆452Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Small cyber challenges for fun and no profit☆12May 20, 2025Updated 11 months ago
- ForensicArtifacts.com Artifact Repository☆12Updated this week
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- AI-powered tool designed to help producing Threat Intelligence Mindmap.☆108Feb 16, 2026Updated 2 months ago
- Host-based vulnerability scanner. Find installed packages on the host, ask their vulnerabilities to vulmon.com API and print vulnerabilit…☆16Apr 20, 2019Updated 7 years ago
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago