referefref / aiocriocLinks
An LLM and OCR based Indicator of Compromise Extraction Tool
☆35Updated 9 months ago
Alternatives and similar repositories for aiocrioc
Users that are interested in aiocrioc are comparing it to the libraries listed below
Sorting:
- Examine Chrome extensions for security issues☆85Updated last month
- ☆17Updated 2 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 10 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated last year
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆26Updated 2 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 11 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆56Updated 7 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated last week
- Repository that contains a set of purposefully erroneous Yara rules.☆58Updated last month
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- ☆112Updated 2 years ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆48Updated 6 months ago
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated 11 months ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆76Updated 2 years ago
- ☆57Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- A home for detection content developed by the delivr.to team☆70Updated last month
- ☆60Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆29Updated 2 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆43Updated 2 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆57Updated 5 months ago
- ☆50Updated last year
- Offensive Research Guide to Help Defense Improve Detection☆31Updated 2 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago