kinomakino / Threat-Intelligence-Data
Snort_rules detection bad actors.
☆28Updated 5 months ago
Alternatives and similar repositories for Threat-Intelligence-Data:
Users that are interested in Threat-Intelligence-Data are comparing it to the libraries listed below
- ☆29Updated 6 years ago
- Use DNS to hunt for threats including DGAs☆14Updated 9 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- Tool to identify all domains contained in an IP anonymously☆15Updated 7 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆17Updated 4 years ago
- Home to the ActorTrackr source code☆28Updated 7 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- repo for sharing stuff☆16Updated last year
- VirusTotal SIEM Integration and Automation☆18Updated 8 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- PowerShell Memory Pulling script☆19Updated 9 years ago
- ☆23Updated 4 years ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Updated 3 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 6 years ago
- ☆18Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆56Updated 4 months ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago