google / threat-team
IOCs from Google's Threat Analysis Group (TAG)
☆27Updated last month
Related projects ⓘ
Alternatives and complementary repositories for threat-team
- ☆16Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆17Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- GCP cloud security CTF☆41Updated 8 months ago
- passat - password auditing tool. Does statistical analyses on large sets of cracked passwords.☆24Updated 2 years ago
- Open IOC sharing platform☆53Updated 2 weeks ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 5 months ago
- Enumerate AWS permissions and resources.☆64Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 8 months ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆27Updated 2 years ago
- ☆17Updated last year
- ☆34Updated 8 months ago
- Qemuno Framework☆23Updated 2 years ago
- Collection of IoCs available and related to attacks on ESXi infrastructures that occurred as of Friday February 3, 2023.☆12Updated last year
- Sniffing out well-known threat groups☆28Updated 3 months ago
- Jenkins Security Research☆10Updated 3 months ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆17Updated last month
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆25Updated 3 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆49Updated this week
- URL fingerprinting made easy☆79Updated 7 months ago
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆69Updated last month
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 9 months ago
- ☆36Updated 2 years ago
- ☆42Updated 2 years ago
- create a "simulated internet" cyber range environment☆13Updated last month