joshhighet / transl8
a common schema for internet-connected service discovery π π
β19Updated last year
Alternatives and similar repositories for transl8:
Users that are interested in transl8 are comparing it to the libraries listed below
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users inβ¦β26Updated 2 weeks ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigationsβ43Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β51Updated 3 months ago
- The core backend server handling API requests and task managementβ38Updated 3 weeks ago
- Lightweight Python-Based Malware Analysis Pipelineβ34Updated last week
- Python based CLI for MalwareBazaarβ36Updated 5 months ago
- C2 Active Scannerβ55Updated 9 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.β75Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry Nβ¦β26Updated last week
- Repository that contains a set of purposefully erroneous Yara rules.β50Updated last year
- β87Updated last month
- Detection rule validationβ41Updated last year
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.β21Updated 2 years ago
- β126Updated 3 weeks ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.β66Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reportsβ71Updated 4 months ago
- A Python package and command line utility for scanning emails with YARA rulesβ20Updated this week
- A home for detection content developed by the delivr.to teamβ67Updated last month
- Rules Shared by the Community from 100 Days of YARA 2023β76Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.β60Updated 8 months ago
- A MITRE ATT&CK Lookup Toolβ45Updated 11 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of textβ56Updated 2 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from themβ32Updated 4 months ago
- The Intelligent Process Lifecycle of Active Cyber Defendersβ31Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Editionβ63Updated 2 years ago
- Collection of videos of Raids on Cybercriminalsβ19Updated last week
- Offensive Research Guide to Help Defense Improve Detectionβ30Updated 2 years ago
- A collection of tips for using MISP.β74Updated 3 months ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!β40Updated last week
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscapeβ113Updated 3 years ago