r-cybersecurity / list-of-security-resources-for-ukraineLinks
List of companies or individuals offering cybersecurity services, data, or other tangible assets to assist in Ukraine's defense of its independence.
☆67Updated 3 years ago
Alternatives and similar repositories for list-of-security-resources-for-ukraine
Users that are interested in list-of-security-resources-for-ukraine are comparing it to the libraries listed below
Sorting:
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- URL fingerprinting made easy☆89Updated last year
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆149Updated 3 years ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆26Updated 4 years ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 4 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆52Updated 5 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- The open ransomware payment tracker☆98Updated this week
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- PDFExaminer Tool - Analyse PDF Malware☆60Updated 4 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆76Updated 3 years ago
- Malware vulnerability intel tool for third-party attackers☆122Updated 10 months ago
- Integrated web scraper and email account data breach comparison tool☆79Updated last year
- Uncover the full name of a target on Linkedin.☆163Updated 3 years ago
- Your go-to resource for all things OSINT☆179Updated last year
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆183Updated 4 years ago
- ☆96Updated 3 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- Orca - Targeted OSINT Framework☆90Updated last year
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Updated 3 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year
- an awesome list of active defense resources☆125Updated 5 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- Check if your provider is blocking you!☆105Updated 3 years ago
- Tools for investigating Log4j CVE-2021-44228☆95Updated 3 years ago
- An uploader honeypot designed to look like poor website security.☆28Updated 4 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Honeyscanner: A vulnerability analyzer for honeypots☆46Updated last year