joshhighet / transl8Links
a common schema for internet-connected service discovery π π
β19Updated last week
Alternatives and similar repositories for transl8
Users that are interested in transl8 are comparing it to the libraries listed below
Sorting:
- C2 Active Scannerβ59Updated last year
- Cyber Underground General Intelligence Requirementsβ94Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry Nβ¦β34Updated 2 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users inβ¦β30Updated 2 months ago
- BlackBerry Threat Research & Intelligenceβ98Updated last year
- The core backend server handling API requests and task managementβ43Updated 3 weeks ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.β66Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β52Updated 7 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.β61Updated last year
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - httpsβ¦β126Updated last year
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the synβ¦β33Updated 11 months ago
- Forensic Artifact Collection Tool Matrixβ85Updated 8 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigationsβ43Updated 3 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.β45Updated 3 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from themβ33Updated 3 weeks ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copiesβ104Updated last year
- Detection rule validationβ41Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Editionβ64Updated 2 years ago
- my MSTICpy practice and custom tools repositoryβ11Updated 2 months ago
- Lightweight Python-Based Malware Analysis Pipelineβ34Updated 3 weeks ago
- A collection of tips for using MISP.β74Updated 7 months ago
- β93Updated 2 months ago
- God Mode Detection Rulesβ134Updated 11 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.β115Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilitiesβ90Updated last year
- AIL project training materialsβ33Updated this week
- A YARA & Malware Analysis Toolkit written in Rust.β36Updated last week
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reportsβ73Updated 8 months ago
- Can you pay the ransom in your country?β14Updated last year
- Sigma detection rules for hunting with the threathunting-keywords projectβ55Updated 4 months ago