hslatman / awesome-securityLinks
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
☆25Updated 8 years ago
Alternatives and similar repositories for awesome-security
Users that are interested in awesome-security are comparing it to the libraries listed below
Sorting:
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Updated 9 years ago
- A curated list of tools for incident response☆19Updated 5 years ago
- A curated list of awesome social engineering resources.☆16Updated 8 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆68Updated 10 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆18Updated 8 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- IOCs for CRASHOVERRIDE malware framework☆26Updated 7 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Python script to pull various IOCs from PDFs☆15Updated 10 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆13Updated 8 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆14Updated 3 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 7 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆22Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- ☆22Updated 7 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- Maltego Transform to put entities into MISP events☆27Updated 3 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Updated 8 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 7 years ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago