rf-peixoto / phishing_pot
A collection of phishing samples for researchers and detection developers.
☆246Updated this week
Related projects: ⓘ
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆177Updated 3 months ago
- A RedTeam Toolkit☆377Updated 7 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆236Updated 4 months ago
- ☆213Updated last year
- CLI tools for forensic investigation of Windows artifacts☆296Updated last month
- Awesome list of keywords and artifacts for Threat Hunting sessions☆436Updated 2 weeks ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆268Updated 2 weeks ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆176Updated 2 months ago
- Just some lists of Malware Configs☆158Updated 2 weeks ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆92Updated last month
- Find CVEs associated to Linux and public exploits on github☆108Updated 8 months ago
- ☆125Updated 11 months ago
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆175Updated 2 weeks ago
- MISP Playbooks☆167Updated last month
- Strumenti di Acquisizione e Analisi di copie Forensi☆137Updated 5 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆149Updated 3 weeks ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆322Updated last month
- ☆152Updated 6 months ago
- The Threat Actor Profile Guide for CTI Analysts☆89Updated last year
- Some Threat Hunting queries useful for blue teamers☆120Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆266Updated 3 weeks ago
- Repository resource for threat hunter☆157Updated 6 years ago
- A resource containing all the tools each ransomware gangs uses☆551Updated this week
- Advanced Bash script designed for conducting digital forensics on Linux systems☆130Updated 5 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆189Updated 10 months ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆181Updated 4 months ago
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆185Updated this week
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆329Updated 3 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆242Updated last month
- Shodan Dorks 2023☆229Updated last year