Chapter 9: Disseminate
☆16Sep 6, 2017Updated 8 years ago
Alternatives and similar repositories for intelligence-product-templates
Users that are interested in intelligence-product-templates are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Intrusion Detection Honeypots Book Code☆28Aug 31, 2020Updated 5 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- Convert any existing speaker you have to a fully local, home assistant compatible media player with just two parts. Parts used; - ESP32…☆47Feb 23, 2026Updated last month
- ☆17Aug 24, 2020Updated 5 years ago
- A system that creates a bogus web structure to entrap and delay web scanners☆68May 27, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A tool for RetroPie to convert videos.☆12Jul 28, 2020Updated 5 years ago
- Integrated tool for extracting scripts and binaries of AutoIt, AutoHotKey, InnoSetup, NSIS executables and Decoding powershell / jse / vb…☆14Dec 10, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/malwarecookbook☆42May 25, 2015Updated 10 years ago
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- CARET - A tool for viewing cyber analytic relationships☆57Jan 15, 2020Updated 6 years ago
- Private AI and Open source driven projects that can be used to help solve a plethora of security problems☆19Sep 7, 2024Updated last year
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Scripts that cover the basics of interacting with the AMP for Endpoints API☆17Feb 22, 2019Updated 7 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated 2 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Aug 11, 2020Updated 5 years ago
- Convert Sigma rules to LogRhythm searches☆23Feb 27, 2022Updated 4 years ago
- ☆11Oct 11, 2020Updated 5 years ago
- A bot to quickly get information about an IP, useful to get threat intelligence informations for blue team.☆12Apr 14, 2025Updated last year
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- ☆31Feb 15, 2017Updated 9 years ago
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆25Apr 1, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 7 years ago
- Tor command line tools for Mac☆12Jan 20, 2016Updated 10 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆13Jun 24, 2018Updated 7 years ago
- ☆15Aug 8, 2017Updated 8 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Slides from presentations I give!☆27Feb 27, 2026Updated last month
- Convert Markdown timeline to Graphviz DOT☆18Feb 14, 2026Updated 2 months ago
- An arduino project to simulate the visual effect of aurora borealis on an LED strip.☆26Jan 12, 2021Updated 5 years ago
- Defender for Endpoint☆28Mar 28, 2026Updated 2 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Pwnage☆17Jul 1, 2025Updated 9 months ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆13Mar 6, 2023Updated 3 years ago
- Wiki for general information about repositories☆23Nov 14, 2018Updated 7 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago