kdrypr / CTI-Feed-Collector
Open Source Cyber Threat Intelligence Feed Collector
☆16Updated 3 years ago
Alternatives and similar repositories for CTI-Feed-Collector:
Users that are interested in CTI-Feed-Collector are comparing it to the libraries listed below
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆22Updated 2 years ago
- A ransomware group monitoring bot written in C#.☆56Updated 3 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 3 years ago
- A repo for security analytics & threat hunting resources☆21Updated 6 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- ☆47Updated this week
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- ☆12Updated 2 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated 11 months ago
- Cheat sheets for threat hunting, detection and other stuff.☆33Updated 2 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- Active Directory Penetration Testing Tool☆27Updated 3 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- ☆22Updated 8 months ago
- ATLAS - Malware Analysis Description☆20Updated last year
- IOC Collection 2022☆57Updated 2 years ago
- Random notes collected on the intertubes relating to DFIR☆32Updated last year
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆21Updated 2 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆31Updated last year
- Quick SOC L1 ticket structure☆35Updated 5 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Hunt malware with Volatility☆47Updated 11 months ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Updated 2 years ago
- Carbon Black Response IR tool☆53Updated 4 years ago
- Chista | Open Threat Intelligence Framework☆58Updated 11 months ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆33Updated 7 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 9 months ago
- ☆34Updated last year
- ☆65Updated 3 years ago