referefref / aiocrioc
An LLM and OCR based Indicator of Compromise Extraction Tool
☆33Updated 4 months ago
Alternatives and similar repositories for aiocrioc:
Users that are interested in aiocrioc are comparing it to the libraries listed below
- ☆16Updated 5 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 5 months ago
- pocket guide for core detection engineering concepts☆28Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 6 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated last month
- Can you pay the ransom in your country?☆14Updated last year
- Examine Chrome extensions for security issues☆81Updated last month
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 6 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆19Updated last week
- Anvilogic Forge☆95Updated last week
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- An index of publicly available and open-source threat detection rulesets.☆30Updated this week
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 5 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆46Updated 7 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 5 months ago
- ☆14Updated 2 years ago
- ☆41Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated last month
- NOVA: The Prompt Pattern Matching☆49Updated this week
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆21Updated 7 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Updated 4 months ago
- ☆29Updated 5 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆23Updated this week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 11 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆27Updated last year