r-cybersecurity / list-of-security-resources-for-ukraineLinks
List of companies or individuals offering cybersecurity services, data, or other tangible assets to assist in Ukraine's defense of its independence.
☆67Updated 3 years ago
Alternatives and similar repositories for list-of-security-resources-for-ukraine
Users that are interested in list-of-security-resources-for-ukraine are comparing it to the libraries listed below
Sorting:
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated last year
- A utility that automatically takes screenshots of coordinates using Google Earth.☆26Updated 4 years ago
- URL fingerprinting made easy☆89Updated last year
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆77Updated 3 years ago
- System based on +500 blacklists and 5 external intelligences to detect internet potencially malicious hosts☆150Updated 3 years ago
- A pure python tool for finding and comparing typo-squatting, bitsqatting, and homoglyph domain attacks and brand impersonation☆40Updated 3 months ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆46Updated 4 years ago
- Python-based Disinformation and Deception bot for Twitter with OPSEC in mind.☆52Updated 5 years ago
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Updated 2 years ago
- Collection of videos of Raids on Cybercriminals☆20Updated 6 months ago
- Repository and archive for Killing The Bear Gitbook☆83Updated 2 years ago
- Integrated web scraper and email account data breach comparison tool☆79Updated last year
- Honeyscanner: A vulnerability analyzer for honeypots☆48Updated last year
- A list of user agents belonging to common web scanners.☆40Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- The open ransomware payment tracker☆98Updated 3 weeks ago
- Accompanying documentation, images, source code and other stuff from the cybernomad.online blog☆28Updated 5 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 2 weeks ago
- Orca - Targeted OSINT Framework☆90Updated last year
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆76Updated 2 years ago
- CLI tools using Harpoon features☆22Updated last year
- Uncover the full name of a target on Linkedin.☆163Updated 3 years ago
- Persistent twitter monitor tool for 2021 SANS OSINT Summit Talk☆18Updated 3 years ago
- Links to materials referenced in the SANS Tech Tuesday workshop June 30,2020☆29Updated 4 years ago
- Check if your provider is blocking you!☆105Updated 3 years ago
- Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, Microsoft Azure, and Digital Ocean simultaneousl…☆17Updated 8 months ago
- Malware vulnerability intel tool for third-party attackers☆122Updated 11 months ago
- High signal information security sources Goggle.☆67Updated 2 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Updated 3 years ago