rmceoin / gmalvertising
Hacked up scripts to perform google searches
☆14Updated 9 months ago
Alternatives and similar repositories for gmalvertising:
Users that are interested in gmalvertising are comparing it to the libraries listed below
- A home for detection content developed by the delivr.to team☆67Updated 2 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated last year
- C2 Active Scanner☆52Updated 8 months ago
- The Threat Actor Profile Guide for CTI Analysts☆104Updated last year
- Cyber Underground General Intelligence Requirements☆90Updated last year
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- Lacus is a capturing system using playwright, as a web service.☆56Updated this week
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆22Updated last week
- A happy place for detection engineers, purple teamers and threat hunters focusing on macOS.☆21Updated 2 years ago
- A list of RMMs designed to be used in automation to build alerts☆108Updated 3 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆102Updated 4 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆53Updated this week
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- Converting data from services like Censys and Shodan to a common data model☆49Updated 5 months ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆39Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆127Updated last year
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated last week
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 2 years ago
- ☆29Updated this week
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆67Updated 3 months ago
- God Mode Detection Rules☆134Updated 6 months ago
- ☆84Updated last week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 3 months ago
- Python library for threat intelligence☆83Updated last month
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆84Updated 6 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆110Updated last year
- Website crawler with YARA detection☆88Updated last year
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆31Updated 6 months ago
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year