securitywithoutborders / organization
Documents pertaining to internal policies and guidelines
☆12Updated 8 years ago
Alternatives and similar repositories for organization:
Users that are interested in organization are comparing it to the libraries listed below
- This is where we work on the newsletter☆28Updated 7 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated 2 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Advices to look for malicious software on your devices☆17Updated 4 years ago
- Maltego Transform to put entities into MISP events☆27Updated 3 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Updated 9 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Extract information from MISP via the API☆15Updated 8 years ago
- Baseline organizational policies and practices☆10Updated 7 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11Updated 9 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 8 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Enables dynamic translation of structured data between formats☆14Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- CRITs IOC Visualization in Maltego☆27Updated 10 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Python bindings for Yeti's API☆18Updated last year
- Fun with Amazon AWS and Maltego☆29Updated 7 years ago
- A streamlined way to create STIX documents!☆32Updated 10 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 9 years ago
- Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.☆59Updated 4 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Updated 7 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆34Updated 3 years ago