kdrypr / CTI-Feed-Collector
Open Source Cyber Threat Intelligence Feed Collector
☆15Updated 3 years ago
Alternatives and similar repositories for CTI-Feed-Collector:
Users that are interested in CTI-Feed-Collector are comparing it to the libraries listed below
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆33Updated 2 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆22Updated 2 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 2 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆55Updated 2 years ago
- Chista | Open Threat Intelligence Framework☆57Updated 8 months ago
- ☆12Updated last year
- Useful resources about phishing email analysis☆77Updated 3 years ago
- ATLAS - Malware Analysis Description☆20Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated last year
- IOC Collection 2022☆56Updated last year
- ☆45Updated 9 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated 9 months ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- Active Directory Penetration Testing Tool☆27Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- A repo for security analytics & threat hunting resources☆21Updated 6 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆11Updated 4 months ago
- ☆33Updated last year
- Virus Total Free - IOC parser and report generator☆23Updated last year
- ☆10Updated last month
- Malware Analysis (Zararlı Yazılım Analizi)☆31Updated 5 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆25Updated 2 years ago
- Simple PowerShell script to enable process scanning with Yara.☆91Updated 2 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆33Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 2 years ago
- ⚠️ Malware Development training ⚠️☆30Updated last month