openctibr / threatFeeds
OpenCTI.BR ThreatFeeds Public Repository
☆102Updated this week
Related projects ⓘ
Alternatives and complementary repositories for threatFeeds
- ☆29Updated last year
- ☆98Updated 3 years ago
- The purpose of this script is to automate the web enumeration process and search for exploits☆114Updated 2 years ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆218Updated last week
- A collection of phishing samples for researchers and detection developers.☆265Updated last week
- This repository contains links to awesome security articles.☆36Updated 3 months ago
- Epyon is a swiss army knife tool for pentesting DevOps ecosystems.☆72Updated 5 months ago
- ☆16Updated 2 years ago
- Material do Bootcamp de Red Team - by Victor de Queiroz☆39Updated 3 years ago
- Some of my presentations and published articles in different conferences☆18Updated 3 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆211Updated 5 months ago
- BugBuntu Linux☆150Updated 3 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆75Updated 11 months ago
- The most powerfull Web Content Scanner☆116Updated last year
- Repository resource for threat hunter☆158Updated 6 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆218Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆137Updated 11 months ago
- MISP Playbooks☆174Updated this week
- Wazuh integration TheHive☆33Updated last year
- Brazilian OSINT Sources☆28Updated 11 months ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆181Updated 2 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆36Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆130Updated 2 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆51Updated 5 years ago
- Resources To Learn And Understand SIGMA Rules☆169Updated last year
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆115Updated 3 months ago
- eml metadata parser.☆17Updated last year
- ☆31Updated 2 years ago
- Standard-Format Threat Intelligence Feeds☆102Updated this week