nccgroup / Threat-Intelligence-AlertsLinks
Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding intelligence we have identified relating to emerging threats. As part of our mission to make our society more secure we wanted to make these alerts visible to all.
☆25Updated 2 years ago
Alternatives and similar repositories for Threat-Intelligence-Alerts
Users that are interested in Threat-Intelligence-Alerts are comparing it to the libraries listed below
Sorting:
- A few quick recipes for those that do not have much time during the day☆22Updated 9 months ago
- ☆33Updated 6 months ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Updated 6 years ago
- Windows Security Logging☆43Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 8 months ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- ☆12Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- THOR APT Scanner User Manual☆18Updated last week
- Hashes of infamous malware☆26Updated 2 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Updated 3 years ago
- Various components we use in labs☆10Updated 4 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆53Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 4 years ago
- ☆11Updated 4 years ago
- ☆15Updated 3 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 9 months ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆16Updated 6 months ago