Sniffing out well-known threat groups
☆64Aug 13, 2024Updated last year
Alternatives and similar repositories for Akamaru
Users that are interested in Akamaru are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI-Powered Threat Intelligence MCP tool☆35Jul 18, 2025Updated 8 months ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆27Dec 13, 2022Updated 3 years ago
- Python Script to check website for username☆31May 4, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Beginners Guide to Hunting for Threats☆19Apr 26, 2025Updated 11 months ago
- ☆18Sep 13, 2021Updated 4 years ago
- This script searches messages containing specified search terms in Telegram channels the user is a member of.☆62Jul 11, 2023Updated 2 years ago
- This will be a repository of SentinelOne Deep Visibility queries both the Standard Queries and the Power Queries. Most of these queries w…☆35Oct 15, 2024Updated last year
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆170Nov 10, 2023Updated 2 years ago
- A modern, real-time monitoring dashboard built with FastAPI and Svelte. This application demonstrates real-time data streaming using Serv…☆19Mar 31, 2025Updated last year
- osquery query packs☆14Aug 31, 2018Updated 7 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆118Oct 29, 2024Updated last year
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- A very poor and very simple local face recognition search engine☆19Mar 23, 2024Updated 2 years ago
- MD5 algorithm implementation - x86 assembler☆25Mar 15, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Cross-platform username reconnaissance tool built for OSINT investigators, cyber threat analysts, red teamers, and CTF enthusiasts.☆129Aug 10, 2025Updated 8 months ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- Scraper for Odysee: alt-tech platform for sharing video☆18Nov 29, 2023Updated 2 years ago
- AIL project training materials☆39Feb 24, 2026Updated last month
- Reversing Citrix Gateway for XSS☆17Jul 3, 2023Updated 2 years ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆480Feb 14, 2026Updated 2 months ago
- ☆38Jan 24, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Script to check for CVE-2023-36884 hardening☆15Jul 18, 2023Updated 2 years ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆447Feb 13, 2026Updated 2 months ago
- Python 3 library to request https://crt.sh/☆37Oct 28, 2025Updated 5 months ago
- Hive v5 file decryption algorithm☆34Nov 28, 2022Updated 3 years ago
- Small cyber challenges for fun and no profit☆12May 20, 2025Updated 10 months ago
- ForensicArtifacts.com Artifact Repository☆12Updated this week
- Malware analysis tool based on taint analysis.☆14Jan 29, 2022Updated 4 years ago