Snort_rules detection bad actors.
☆29Aug 18, 2024Updated last year
Alternatives and similar repositories for Threat-Intelligence-Data
Users that are interested in Threat-Intelligence-Data are comparing it to the libraries listed below
Sorting:
- Coleccion de IRM de Societe Generale traducidos por mí al Español☆35May 12, 2017Updated 8 years ago
- Herramienta para Windows que permite automatizar tareas de Footprint y Fingerprint en un Test de Intrusión☆15Jan 1, 2018Updated 8 years ago
- Popular Ransomware file extensions☆27Jan 16, 2026Updated last month
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Demo for Elastic's Auditbeat and SIEM☆24Jun 15, 2021Updated 4 years ago
- Suppress list for snort in pfsense☆21Apr 7, 2016Updated 9 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Tool to identify all domains contained in an IP anonymously☆15Jun 4, 2017Updated 8 years ago
- SMTP Server Tester, by Alton Johnson (alton.jx@gmail.com)☆19Jul 3, 2015Updated 10 years ago
- Logs Forensic Investigator SSH☆14Oct 27, 2018Updated 7 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Terminal Forensics CheatSheets☆13Jul 28, 2015Updated 10 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- Wireless Forensics Framework In Python☆19Jan 29, 2017Updated 9 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 5 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆40May 18, 2022Updated 3 years ago
- IDS based on Machine Learning technical☆20Nov 12, 2018Updated 7 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- ☆21May 19, 2016Updated 9 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- Actualización de Huron, distro Linux para Osint☆21Jul 30, 2019Updated 6 years ago
- 2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the year to end. But just as 2020 was about to close, …☆20Mar 26, 2022Updated 3 years ago
- Repositorio donde compartimos con la comunidad scripts de bash relacionados con seguridad (parseadores, escáneres de vulnerabilidades, fo…☆62Mar 15, 2017Updated 8 years ago
- Metasploit Framework☆20May 8, 2017Updated 8 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- IRC bot framework written in Python.☆30Mar 20, 2021Updated 4 years ago
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- Brute force attack detection with exponential-decay pressure scoring, 42 service rules, 8 firewall backends, IPv4/IPv6, and repeat-offend…☆26Updated this week
- Script that checks for available updates for the most commonly used Digital Forensics tools☆60Dec 10, 2020Updated 5 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Security Tool Builder: project to automate the building of hacking tools☆21Mar 7, 2022Updated 4 years ago