phretor / infosec-opml
My very personal and opinionatedly organized infosec/cybersec sources in one OPML file
☆57Updated 2 years ago
Alternatives and similar repositories for infosec-opml:
Users that are interested in infosec-opml are comparing it to the libraries listed below
- Signature based honeypot detector tool written in Golang☆92Updated last month
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 2 weeks ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- ☆22Updated 4 years ago
- Do bulk whois lookups and get alerted on domains of interest.☆34Updated 9 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 9 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 5 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 5 months ago
- ☆57Updated last year
- An index of publicly available and open-source threat detection rulesets.☆54Updated 3 weeks ago
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- ☆47Updated 10 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆89Updated last year
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- ☆93Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated last year
- ☆28Updated 4 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆123Updated last year
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- DEbian Cve REproducer Tool☆24Updated last year
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated last year
- DEFCON 31 slide deck and video link☆60Updated 10 months ago