intelshare / Forums-For-RFI
Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>
☆40Updated this week
Related projects: ⓘ
- Sniffing out well-known threat groups☆28Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- Linux Baseline and Forensic Triage Tool - BETA☆51Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- ☆14Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆38Updated 8 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆31Updated last month
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- ☆17Updated this week
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆31Updated 5 months ago
- Collection of videos of Raids on Cybercriminals☆17Updated 3 months ago
- Contains compiled binaries of Volatility☆28Updated 2 months ago
- C2 Active Scanner☆45Updated 3 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆57Updated 8 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 2 weeks ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 3 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated 11 months ago
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 3 months ago
- Virus Total Free - IOC parser and report generator☆22Updated last year
- ☆23Updated this week
- ☆34Updated 6 months ago
- CarbonBlack EDR detection rules and response actions☆70Updated last week
- MS Graph Commands and Tools for Blue Teamers☆47Updated 10 months ago
- ☆13Updated last year
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆21Updated 3 weeks ago
- ☆12Updated 2 years ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆27Updated 3 months ago