kinomakino / Threat-Intelligence-DataView external linksLinks
Snort_rules detection bad actors.
☆29Aug 18, 2024Updated last year
Alternatives and similar repositories for Threat-Intelligence-Data
Users that are interested in Threat-Intelligence-Data are comparing it to the libraries listed below
Sorting:
- Coleccion de IRM de Societe Generale traducidos por mí al Español☆35May 12, 2017Updated 8 years ago
- Herramienta para Windows que permite automatizar tareas de Footprint y Fingerprint en un Test de Intrusión☆15Jan 1, 2018Updated 8 years ago
- Popular Ransomware file extensions☆27Jan 16, 2026Updated last month
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Demo for Elastic's Auditbeat and SIEM☆24Jun 15, 2021Updated 4 years ago
- Suppress list for snort in pfsense☆21Apr 7, 2016Updated 9 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Top DNS Measurement for Bro☆11Aug 22, 2020Updated 5 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- SMTP Server Tester, by Alton Johnson (alton.jx@gmail.com)☆19Jul 3, 2015Updated 10 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- Logs Forensic Investigator SSH☆14Oct 27, 2018Updated 7 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- Pentest tools for Windows hacking processes☆13May 2, 2017Updated 8 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Terminal Forensics CheatSheets☆13Jul 28, 2015Updated 10 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 5 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- IDS based on Machine Learning technical☆20Nov 12, 2018Updated 7 years ago
- Tool to automate the whole process of environment in android audits☆14Apr 30, 2019Updated 6 years ago
- Metasploit Framework☆20May 8, 2017Updated 8 years ago
- 2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the year to end. But just as 2020 was about to close, …☆20Mar 26, 2022Updated 3 years ago
- Repositorio donde compartimos con la comunidad scripts de bash relacionados con seguridad (parseadores, escáneres de vulnerabilidades, fo…☆62Mar 15, 2017Updated 8 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 6 years ago
- Shared yara rules☆30Mar 17, 2014Updated 11 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Script that checks for available updates for the most commonly used Digital Forensics tools☆60Dec 10, 2020Updated 5 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 10 years ago
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- Security Tool Builder: project to automate the building of hacking tools☆21Mar 7, 2022Updated 3 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- The simple, agnostic and lightweight logging dashboard☆26Oct 28, 2022Updated 3 years ago