micahflee / blueleaks-explorer
open source software for journalists to investigate all of the data in the BlueLeaks dataset
☆21Updated this week
Alternatives and similar repositories for blueleaks-explorer:
Users that are interested in blueleaks-explorer are comparing it to the libraries listed below
- Scripts to deploy and update MISP in air-gapped environments☆17Updated 2 weeks ago
- ☆64Updated 4 years ago
- Useful commands for infosec☆29Updated 2 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆19Updated this week
- A PoC backdoor that uses Gmail as a C&C server☆14Updated 4 years ago
- AMI is a web application that helps people to create legal requests for copies of their personal information from data operators.☆29Updated 5 years ago
- misp-guard is a mitmproxy addon that inspects and blocks outgoing events to external MISP instances via sync mechanisms (pull/push) based…☆14Updated last month
- Yet another way to find where to report an abuse☆32Updated 2 months ago
- AIL project training materials☆28Updated last month
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- The open ransomware payment tracker☆93Updated 5 months ago
- Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list☆33Updated this week
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- A collection of handy Google Apps Script code snippets☆27Updated 2 years ago
- Digital Forensics XML packages in Python☆15Updated last month
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- Build Automated Machine Images for MISP☆28Updated last year
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated 9 months ago
- ☆22Updated 10 months ago
- An open source platform to support analysts to organise their case and tasks☆67Updated this week
- Index and collection of MVT compatibile indicators of compromise.☆82Updated 3 months ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Open-source Fabric templates for cybersecurity and compliance☆16Updated 2 months ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆69Updated this week
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- High signal information security sources Goggle.☆67Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆44Updated 2 weeks ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last month