stanfrbd / cyberbro
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
☆286Updated this week
Alternatives and similar repositories for cyberbro:
Users that are interested in cyberbro are comparing it to the libraries listed below
- A repository of credential stealer formats☆193Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆242Updated this week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆191Updated last month
- TRACE is a digital forensic analysis tool that provides a user-friendly interface for investigating disk images.☆155Updated last week
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated this week
- A curated list of Awesome Threat Intelligence Blogs☆371Updated 2 weeks ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆348Updated 3 weeks ago
- Advanced Bash script designed for conducting digital forensics on Linux systems☆138Updated 10 months ago
- God Mode Detection Rules☆134Updated 6 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆525Updated this week
- CLI tools for forensic investigation of Windows artifacts☆324Updated 3 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆163Updated 8 months ago
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆98Updated this week
- 🏴☠️💰 Another Ransomware gang tracker☆177Updated this week
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆99Updated 2 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 9 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆146Updated 5 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆390Updated last year
- Yet another Ransomware gang tracker☆376Updated this week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆223Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆182Updated 7 months ago
- Live Feed of C2 servers, tools, and botnets☆579Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆208Updated this week
- Halberd : Multi-Cloud Attack Platform☆248Updated 2 weeks ago
- Mapping of open-source detection rules and atomic tests.☆124Updated last month
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆637Updated 3 weeks ago
- MISP Playbooks☆184Updated last week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆521Updated this week