kdrypr / CTI-Feed-CollectorLinks
Open Source Cyber Threat Intelligence Feed Collector
☆16Updated 3 years ago
Alternatives and similar repositories for CTI-Feed-Collector
Users that are interested in CTI-Feed-Collector are comparing it to the libraries listed below
Sorting:
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆22Updated 3 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 3 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- A repo for security analytics & threat hunting resources☆21Updated 6 years ago
- ☆12Updated 2 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- ATLAS - Malware Analysis Description☆21Updated last year
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- ☆48Updated 3 weeks ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated last year
- Carbon Black Response IR tool☆53Updated 4 years ago
- Chista | Open Threat Intelligence Framework☆58Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Useful resources about phishing email analysis☆85Updated 4 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 10 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- ☆34Updated last year
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- URL fingerprinting made easy☆86Updated last year
- Hunt malware with Volatility☆47Updated last year
- Learning volatility plugins.☆19Updated 4 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Updated 3 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 6 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago