Snort_rules detection bad actors.
☆29Aug 18, 2024Updated last year
Alternatives and similar repositories for Threat-Intelligence-Data
Users that are interested in Threat-Intelligence-Data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Herramienta para Windows que permite automatizar tareas de Footprint y Fingerprint en un Test de Intrusión☆15Jan 1, 2018Updated 8 years ago
- Popular Ransomware file extensions☆27Jan 16, 2026Updated 2 months ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Tool to automate the whole process of environment in android audits☆14Apr 30, 2019Updated 6 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- The simple, agnostic and lightweight logging dashboard☆26Oct 28, 2022Updated 3 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- Terminal Forensics CheatSheets☆13Jul 28, 2015Updated 10 years ago
- ☆18Jan 22, 2026Updated 2 months ago
- Suppress list for snort in pfsense☆21Apr 7, 2016Updated 9 years ago
- Actualización de Huron, distro Linux para Osint☆21Jul 30, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- ☆13Apr 26, 2016Updated 9 years ago
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 6 years ago
- IDS based on Machine Learning technical☆20Nov 12, 2018Updated 7 years ago
- Logs Forensic Investigator SSH☆14Oct 27, 2018Updated 7 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆58Jun 7, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Pentest tools for Windows hacking processes☆13May 2, 2017Updated 8 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- ☆21May 19, 2016Updated 9 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Aug 17, 2017Updated 8 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- ☆11Feb 9, 2023Updated 3 years ago
- Metasploit Framework☆20Updated this week
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- AYY LMAO☆22Mar 26, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆22Mar 16, 2020Updated 6 years ago
- Script that checks for available updates for the most commonly used Digital Forensics tools☆61Dec 10, 2020Updated 5 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- Snort rules to detect local malware, phishing, and adult content by inspecting DNS responses from OpenDNS☆52Sep 16, 2016Updated 9 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 7 years ago
- Repositorio donde compartimos con la comunidad scripts de bash relacionados con seguridad (parseadores, escáneres de vulnerabilidades, fo…☆62Mar 15, 2017Updated 9 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago