nesg-ugr / c4darknet
☆10Updated 9 months ago
Alternatives and similar repositories for c4darknet:
Users that are interested in c4darknet are comparing it to the libraries listed below
- CyCAT.org API back-end server including crawlers☆30Updated last year
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated this week
- A web scraper to create MISP events and reports☆14Updated last year
- USB Scanning device☆22Updated last week
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Updated last week
- Repository for scripts and tips for "Yara Scan Service"☆20Updated last year
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated last year
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Updated 5 years ago
- ☆14Updated 6 years ago
- CSIRT Jump Bag☆27Updated 8 months ago
- TAPIR is a multi-user, client/server, incident response framework☆45Updated 2 years ago
- AIL project training materials☆27Updated last month
- ☆24Updated 2 years ago
- ☆26Updated 2 years ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Yara rules☆19Updated last year
- ☆13Updated 7 months ago
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆21Updated 9 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆43Updated 2 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Updated 2 years ago
- Site for IWS book content☆18Updated 6 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆43Updated 2 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- XOR Key Extractor☆49Updated 5 months ago
- C# User Simulation☆32Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆30Updated this week