Open Source Cyber Threat Intelligence Feed Collector
☆16Sep 6, 2021Updated 4 years ago
Alternatives and similar repositories for CTI-Feed-Collector
Users that are interested in CTI-Feed-Collector are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Apr 22, 2022Updated 3 years ago
- A Python/Scapy based ARP Cache Poisoning tool.☆11Apr 3, 2016Updated 10 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- Yet another implementation of PEiD with yara☆17Jan 6, 2017Updated 9 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆32Jun 28, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- ☆44Jul 11, 2025Updated 9 months ago
- Red Teaming Tactics and Techniques☆12Feb 10, 2022Updated 4 years ago
- CSIRT Jump Bag☆27Apr 25, 2024Updated last year
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- A collection of Volatility Framework plugins.☆26Aug 29, 2013Updated 12 years ago
- A R Package for Property Tax analysis☆11Dec 22, 2025Updated 3 months ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- Powershell script to emulate the "blast radius" of a ransomware infection.☆28Jul 27, 2021Updated 4 years ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 10 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- This project is a continuation of the Moriarty project. But this osint website, has more feautres than Moriarty has☆33Mar 21, 2021Updated 5 years ago
- ☆12Apr 21, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- An open API of US colleges and universities☆21May 11, 2017Updated 8 years ago
- A library for fast parse & import of Windows Master File Table($MFT) into Elasticsearch.☆12Jun 23, 2025Updated 9 months ago
- Web interface to IntelMQ☆10Mar 26, 2026Updated 3 weeks ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- Scripts and tools created for appx analysis talk (Magnet summit 2019)☆19Feb 26, 2024Updated 2 years ago
- ☆11Oct 17, 2024Updated last year
- Collection of best practices to add OSINT into MISP and/or MISP communities☆65Sep 29, 2023Updated 2 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆17Apr 1, 2026Updated 2 weeks ago
- An IP list of bad actors targeting public infra like website, ssh endpoints, etc.☆21Mar 31, 2026Updated 2 weeks ago
- ☆10Dec 5, 2017Updated 8 years ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆33Jul 12, 2022Updated 3 years ago
- Winmark is a basic Windows watermark removal script☆27Apr 19, 2022Updated 3 years ago