Sniffing out well-known threat groups
☆64Aug 13, 2024Updated last year
Alternatives and similar repositories for Akamaru
Users that are interested in Akamaru are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Aug 13, 2024Updated last year
- AI-Powered Threat Intelligence MCP tool☆33Jul 18, 2025Updated 8 months ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- Golang Library to interact with your MISP instance☆22Sep 12, 2019Updated 6 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- 🦊 DISINFOX is a threat intelligence exchange platform for disinformation implementing the DISARM framework at its core.☆51Jul 21, 2025Updated 8 months ago
- Python Script to check website for username☆30May 4, 2025Updated 10 months ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Dec 13, 2022Updated 3 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Beginners Guide to Hunting for Threats☆18Apr 26, 2025Updated 10 months ago
- ☆18Sep 13, 2021Updated 4 years ago
- This script searches messages containing specified search terms in Telegram channels the user is a member of.☆62Jul 11, 2023Updated 2 years ago
- This will be a repository of SentinelOne Deep Visibility queries both the Standard Queries and the Power Queries. Most of these queries w…☆33Oct 15, 2024Updated last year
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Copy of the libewf source code that is configured for a 64-bit MS Visual Studio build.☆17Aug 17, 2020Updated 5 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆170Nov 10, 2023Updated 2 years ago
- Let's obscure some IPv4 addresses☆39Mar 16, 2026Updated last week
- A very poor and very simple local face recognition search engine☆18Mar 23, 2024Updated 2 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- osquery query packs☆14Aug 31, 2018Updated 7 years ago
- A modern, real-time monitoring dashboard built with FastAPI and Svelte. This application demonstrates real-time data streaming using Serv…☆19Mar 31, 2025Updated 11 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆117Oct 29, 2024Updated last year
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- ☆18May 6, 2023Updated 2 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Learning Python for Forensics, Second Edition, Published by Packt☆11Apr 5, 2019Updated 6 years ago
- Scraper for Odysee: alt-tech platform for sharing video☆18Nov 29, 2023Updated 2 years ago
- AIL project training materials☆39Feb 24, 2026Updated last month
- Reversing Citrix Gateway for XSS☆17Jul 3, 2023Updated 2 years ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆472Feb 14, 2026Updated last month
- ☆38Jan 24, 2024Updated 2 years ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in dis…☆100Jan 25, 2026Updated last month