eyalmazuz / ThreatIntelligenceCorpusLinks
☆32Updated 6 years ago
Alternatives and similar repositories for ThreatIntelligenceCorpus
Users that are interested in ThreatIntelligenceCorpus are comparing it to the libraries listed below
Sorting:
- ☆17Updated 6 years ago
- GUI Tool to generate threat intelligence information in various formats☆44Updated 7 years ago
- A curated list of tools for incident response☆31Updated last year
- A Passive DNS backend and collector☆31Updated 3 years ago
- A Python malware analysis library.☆50Updated 2 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 11 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Home to the ActorTrackr source code☆30Updated 8 years ago
- Python wrapper for the Mitre ATT&CK framework API☆30Updated 7 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Updated 10 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski☆19Updated 6 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 13 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54Updated last year
- Tool to predict attacker groups from the techniques and software used☆50Updated 4 years ago
- A short and small memory forensics helper.☆52Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆17Updated 8 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Various tools to track the Mirai botnet☆20Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- intrusion detection☆24Updated 8 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Proof-of-concept malware programs. For educational purpose only.☆23Updated 9 years ago
- ☆27Updated 7 years ago