micahflee / blueleaks-explorerLinks
open source software for journalists to investigate all of the data in the BlueLeaks dataset
☆30Updated this week
Alternatives and similar repositories for blueleaks-explorer
Users that are interested in blueleaks-explorer are comparing it to the libraries listed below
Sorting:
- AIL project training materials☆35Updated last month
- Scripts to deploy and update MISP in air-gapped environments☆16Updated last month
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year
- ☆25Updated last month
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆18Updated last week
- Hacked up scripts to perform google searches☆16Updated last year
- Extension to standardize dates and times to the same timezone across social media websites.☆34Updated 2 months ago
- A memorial site for Hackers and Infosec people who have passed☆138Updated last month
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆37Updated last week
- Code that goes along with the Hacks, Leaks, and Revelations book☆171Updated last month
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Updated 6 months ago
- The open ransomware payment tracker☆98Updated 2 weeks ago
- Node module to generate likely aliases for a given human name☆22Updated 2 years ago
- External twitter feeder for AIL framework☆16Updated 2 years ago
- Welcome to the Meta Threat Research Indicator Repository, a dedicated resource for the sharing of Indicators of Compromise (IOCs) and oth…☆164Updated 3 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆118Updated this week
- Index and collection of MVT compatibile indicators of compromise.☆97Updated last month
- Validation tool for SANS Courseware files. Generates and validates against a checksum file.☆20Updated last month
- List of companies or individuals offering cybersecurity services, data, or other tangible assets to assist in Ukraine's defense of its in…☆67Updated 3 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆36Updated last year
- Global Security Database Tools☆44Updated last year
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 3 weeks ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆39Updated last month
- Lacus is a capturing system using playwright, as a web service.☆81Updated this week
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Collected and authored guides for personal and operational security.☆63Updated 2 years ago
- ☆70Updated 5 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 3 months ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year