qeeqbox / reportsLinks
Recent cyber attacks reports & interesting analysis files
☆15Updated 3 years ago
Alternatives and similar repositories for reports
Users that are interested in reports are comparing it to the libraries listed below
Sorting:
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 6 years ago
- All the useful tools interesting to be used☆24Updated 3 years ago
- Cyber Threats Detection Rules☆14Updated 4 months ago
- Hashes of infamous malware☆26Updated 2 years ago
- ☆11Updated 5 years ago
- ☆14Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 5 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- A script to create and assign SOP tasks into the cases☆20Updated 5 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- A collection of tips for using MISP.☆75Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Updated 4 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated 2 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆102Updated 3 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- Windows Security Logging☆43Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Updated 5 years ago
- Tool used to perform threat intelligence against packet data☆36Updated last year
- Yara scan Phishing Kit's Zip archive(s)☆61Updated 7 months ago
- Incident Response Network Tools☆24Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Updated 4 months ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 11 months ago
- Penguin OS Forensic (or Flight) Recorder☆40Updated last year
- Library of threat hunts to get any user started!☆48Updated 5 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Updated 2 years ago
- gundog - guided hunting in Microsoft Defender☆52Updated 4 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆42Updated 2 weeks ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 4 years ago