phretor / infosec-opml
My very personal and opinionatedly organized infosec/cybersec sources in one OPML file
☆56Updated 2 years ago
Alternatives and similar repositories for infosec-opml:
Users that are interested in infosec-opml are comparing it to the libraries listed below
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated last week
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 4 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 9 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- Signature based honeypot detector tool written in Golang☆89Updated 3 weeks ago
- ☆114Updated last year
- An index of publicly available and open-source threat detection rulesets.☆38Updated last week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated last month
- a common schema for internet-connected service discovery 🔎 📚☆19Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- Examine Chrome extensions for security issues☆81Updated last month
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated last month
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- Repository of tools and resources for analyzing Docker containers☆65Updated last year
- Sniffing out well-known threat groups☆28Updated 8 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆92Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- The core backend server handling API requests and task management☆38Updated last week
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆46Updated last month
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 5 months ago
- DEbian Cve REproducer Tool☆23Updated last year
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆119Updated 2 years ago
- A ruleset to find potentially malicious code in macOS malware samples☆39Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- ☆87Updated 2 months ago
- Do bulk whois lookups and get alerted on domains of interest.☆34Updated 8 months ago