google / threat-teamLinks
IOCs from Google Threat Intelligence
☆33Updated 3 months ago
Alternatives and similar repositories for threat-team
Users that are interested in threat-team are comparing it to the libraries listed below
Sorting:
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 9 months ago
- Examine Chrome extensions for security issues☆85Updated last month
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated 2 years ago
- ☆41Updated 9 months ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆26Updated 6 months ago
- Scan your account for the use of untrusted AMIs☆29Updated 3 weeks ago
- ☆164Updated this week
- Repository that contains a set of purposefully erroneous Yara rules.☆58Updated last month
- ☆96Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- ☆41Updated 6 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆35Updated this week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆56Updated 3 weeks ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆117Updated 11 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 11 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated 11 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago
- C2 Active Scanner☆59Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆102Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆78Updated 3 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆71Updated 3 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated 10 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆27Updated 2 months ago
- Short deep dive into Threat Hunting on AWS☆13Updated last year
- ☆21Updated 2 years ago
- ☆71Updated last month