Snort_rules detection bad actors.
☆29Aug 18, 2024Updated last year
Alternatives and similar repositories for Threat-Intelligence-Data
Users that are interested in Threat-Intelligence-Data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Coleccion de IRM de Societe Generale traducidos por mí al Español☆35May 12, 2017Updated 8 years ago
- Herramienta para Windows que permite automatizar tareas de Footprint y Fingerprint en un Test de Intrusión☆15Jan 1, 2018Updated 8 years ago
- Popular Ransomware file extensions☆27Jan 16, 2026Updated 3 months ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 12 years ago
- Tool to automate the whole process of environment in android audits☆14Apr 30, 2019Updated 7 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- The simple, agnostic and lightweight logging dashboard☆26Oct 28, 2022Updated 3 years ago
- Terminal Forensics CheatSheets☆14Jul 28, 2015Updated 10 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- ☆19Apr 16, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Suppress list for snort in pfsense☆21Apr 7, 2016Updated 10 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Actualización de Huron, distro Linux para Osint☆22Jul 30, 2019Updated 6 years ago
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- ☆13Apr 26, 2016Updated 10 years ago
- IDS based on Machine Learning technical☆20Nov 12, 2018Updated 7 years ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 6 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- Logs Forensic Investigator SSH☆15Oct 27, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆59Jun 7, 2022Updated 3 years ago
- Pentest tools for Windows hacking processes☆13May 2, 2017Updated 9 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- ☆21May 19, 2016Updated 9 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 2 months ago
- ☆11Feb 9, 2023Updated 3 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- AYY LMAO☆22Mar 26, 2016Updated 10 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- ☆22Mar 16, 2020Updated 6 years ago