rf-peixoto / phishing_potLinks
A collection of phishing samples for researchers and detection developers.
☆393Updated last month
Alternatives and similar repositories for phishing_pot
Users that are interested in phishing_pot are comparing it to the libraries listed below
Sorting:
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆389Updated last week
- ☆192Updated last year
- CLI tools for forensic investigation of Windows artifacts☆349Updated 6 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆400Updated last week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆631Updated 6 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆290Updated 3 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆723Updated 5 months ago
- Yet another Ransomware gang tracker☆558Updated this week
- A collection of companies that disclose adversary TTPs after they have been breached☆289Updated 2 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆274Updated 7 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆443Updated this week
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆111Updated last year
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆267Updated this week
- Practical Windows Forensics Training☆714Updated last year
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆415Updated 8 months ago
- Map tracking ransomware, by OCD World Watch team☆483Updated 2 weeks ago
- Creation of a laboratory for malware analysis in AWS☆105Updated 3 years ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆409Updated 2 years ago
- Just some lists of Malware Configs☆173Updated last year
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆224Updated 5 months ago
- A RedTeam Toolkit☆409Updated 5 months ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆670Updated 2 years ago
- IOCs collected during day-to-day activities☆104Updated last week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆764Updated 3 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆201Updated last year
- An open-source self-hosted purple team management web application.☆300Updated last week
- Some Threat Hunting queries useful for blue teamers☆131Updated 3 years ago
- ☆244Updated last year
- MISP Playbooks☆222Updated 3 months ago
- Live Feed of C2 servers, tools, and botnets☆743Updated this week