phretor / infosec-opmlLinks
My very personal and opinionatedly organized infosec/cybersec sources in one OPML file
☆57Updated 2 years ago
Alternatives and similar repositories for infosec-opml
Users that are interested in infosec-opml are comparing it to the libraries listed below
Sorting:
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 6 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 6 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Canary Detection☆182Updated last month
- A ruleset to find potentially malicious code in macOS malware samples☆40Updated last year
- ☆47Updated last year
- Repository of tools and resources for analyzing Docker containers☆66Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- ☆115Updated 2 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- DEbian Cve REproducer Tool☆25Updated last year
- a common schema for internet-connected service discovery 🔎 📚☆19Updated last year
- Enumerate AWS permissions and resources.☆69Updated 3 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated this week
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 11 months ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- ☆40Updated 10 months ago
- Rules shared by the community from 100 Days of YARA 2025☆33Updated 5 months ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆73Updated 3 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated this week
- DEFCON 30 Mainframe buffer overlow workshop container☆90Updated last year
- Random things for my own reference☆22Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆47Updated 3 months ago
- ☆57Updated 2 years ago
- Do bulk whois lookups and get alerted on domains of interest.☆36Updated 10 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Signature based honeypot detector tool written in Golang☆97Updated 3 months ago