nccgroup / Threat-Intelligence-Alerts
Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding intelligence we have identified relating to emerging threats. As part of our mission to make our society more secure we wanted to make these alerts visible to all.
☆25Updated 2 years ago
Alternatives and similar repositories for Threat-Intelligence-Alerts
Users that are interested in Threat-Intelligence-Alerts are comparing it to the libraries listed below
Sorting:
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- ☆15Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- ☆33Updated 3 months ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆15Updated 3 years ago
- Threat Mitigation Strategies☆25Updated last year
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Scan and decode NetWire logs☆12Updated 2 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- ☆11Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- Sp00fer blog post -☆26Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 9 months ago
- Windows Security Logging☆43Updated 2 years ago
- Speaking materials from conferences I've given☆9Updated 2 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago