phretor / infosec-opmlLinks
My very personal and opinionatedly organized infosec/cybersec sources in one OPML file
☆58Updated 2 years ago
Alternatives and similar repositories for infosec-opml
Users that are interested in infosec-opml are comparing it to the libraries listed below
Sorting:
- ☆116Updated 2 years ago
- DEbian Cve REproducer Tool☆27Updated 3 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆37Updated 11 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 11 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Random things for my own reference☆22Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- Examine Chrome extensions for security issues☆87Updated this week
- Collection of Tools & Techniques for analyzing URLs☆32Updated 2 years ago
- ☆94Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 3 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆60Updated 3 months ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 4 years ago
- Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Cont…☆49Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- ☆25Updated 5 months ago
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated 2 months ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago