nccgroup / Threat-Intelligence-AlertsLinks
Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding intelligence we have identified relating to emerging threats. As part of our mission to make our society more secure we wanted to make these alerts visible to all.
☆24Updated 2 years ago
Alternatives and similar repositories for Threat-Intelligence-Alerts
Users that are interested in Threat-Intelligence-Alerts are comparing it to the libraries listed below
Sorting:
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 4 years ago
- Windows Security Logging☆43Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 4 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Updated 3 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- THOR APT Scanner User Manual☆20Updated last week
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- ☆15Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated 2 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 5 years ago
- Carving tool based in Radare2 & Yara☆17Updated 7 years ago
- ☆12Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- ☆33Updated 11 months ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 3 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated this week
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- ☆10Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 5 years ago
- ☆42Updated 9 months ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 4 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Updated 5 years ago
- ☆21Updated 2 years ago
- Open YARA scan- and search engine☆25Updated 10 months ago