Chapter 9: Disseminate
☆16Sep 6, 2017Updated 8 years ago
Alternatives and similar repositories for intelligence-product-templates
Users that are interested in intelligence-product-templates are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- Intrusion Detection Honeypots Book Code☆28Aug 31, 2020Updated 5 years ago
- Python tool for converting from joy format to JA3 format SSL/TLS hashes☆11Jun 3, 2020Updated 5 years ago
- ☆17Aug 24, 2020Updated 5 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Integrated tool for extracting scripts and binaries of AutoIt, AutoHotKey, InnoSetup, NSIS executables and Decoding powershell / jse / vb…☆14Dec 10, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/malwarecookbook☆42May 25, 2015Updated 10 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- for Windows Malware Analysis☆16May 14, 2020Updated 5 years ago
- CARET - A tool for viewing cyber analytic relationships☆57Jan 15, 2020Updated 6 years ago
- Private AI and Open source driven projects that can be used to help solve a plethora of security problems☆19Sep 7, 2024Updated last year
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Scripts that cover the basics of interacting with the AMP for Endpoints API☆17Feb 22, 2019Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- PowerShell script for hardening GE digital CIMPLICITY servers☆23Aug 12, 2021Updated 4 years ago
- Beef hook OWA / Outlook☆12Mar 27, 2019Updated 6 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- ☆11Oct 11, 2020Updated 5 years ago
- A bot to quickly get information about an IP, useful to get threat intelligence informations for blue team.☆12Apr 14, 2025Updated 11 months ago
- ☆31Feb 15, 2017Updated 9 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆25Apr 1, 2024Updated last year
- An Open-source Software for SmallBasic Interpreter and Debugger written in Java☆18Sep 11, 2025Updated 6 months ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- This is an implementation of the Elliptic-Curve Diffie-Hellman Cryptographic Algorithm.☆15Nov 29, 2021Updated 4 years ago
- MITRE Shield website☆19Oct 20, 2021Updated 4 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- Defender for Endpoint☆28Jul 12, 2024Updated last year
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- A Python decompiler for 3.11; WIP.☆26Nov 19, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- CTFd Challenge Type which decreases its value after every solve☆18Feb 1, 2019Updated 7 years ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆69Apr 19, 2025Updated 11 months ago
- ☆19Oct 30, 2020Updated 5 years ago