r-cybersecurity / list-of-security-resources-for-ukraineLinks
List of companies or individuals offering cybersecurity services, data, or other tangible assets to assist in Ukraine's defense of its independence.
☆67Updated 3 years ago
Alternatives and similar repositories for list-of-security-resources-for-ukraine
Users that are interested in list-of-security-resources-for-ukraine are comparing it to the libraries listed below
Sorting:
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆150Updated 3 years ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- A utility that automatically takes screenshots of coordinates using Google Earth.☆26Updated 4 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆78Updated 3 years ago
- URL fingerprinting made easy☆89Updated last year
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆27Updated 5 years ago
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- Your go-to resource for all things OSINT☆181Updated last year
- Malware vulnerability intel tool for third-party attackers☆122Updated 11 months ago
- Uncover the full name of a target on Linkedin.☆162Updated 3 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Gotanda is browser Web Extension for OSINT.☆194Updated 2 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- ☆35Updated 2 years ago
- OSINT VM based on Open Source Intelligence Techniques 7th Edition☆67Updated 5 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 5 years ago
- ☆11Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- Forensic Imaging quickstarts!☆14Updated 3 years ago
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Updated 2 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 3 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- Google Chrome forensic tool to process, analyze and visualize browsing artifacts☆121Updated 3 weeks ago
- Python wrapper for urlscan.io's API☆105Updated 3 years ago