thirdeyeintelligence / IOCs-in-CSV-formatLinks
The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research
☆12Updated 8 years ago
Alternatives and similar repositories for IOCs-in-CSV-format
Users that are interested in IOCs-in-CSV-format are comparing it to the libraries listed below
Sorting:
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 7 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- dnmap revised (dnmapR) is a modernized and enhanced version of dnmap☆34Updated 6 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Automated Security Assessment Reporting Tool☆37Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Updated last year
- Shodan.io connector for Phantom Cyber Security Orchestration☆22Updated 9 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- HoneyDB Python Module☆13Updated last year
- Yara intergrated into BurpSuite☆48Updated 9 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- ☆27Updated 7 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- ☆46Updated 7 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- Python wrapper for the Mitre ATT&CK framework API☆30Updated 7 years ago