Repository collecting and automagically processing public threat intelligence reports.
☆19May 1, 2020Updated 5 years ago
Alternatives and similar repositories for cti_report_collection
Users that are interested in cti_report_collection are comparing it to the libraries listed below
Sorting:
- 用于辅助安全工程师漏洞挖掘、测试、复现,集合了mock、httplog、dns tools、xss,可用于测试各类无回显、无法直观判断或特定场景下的漏洞。☆11Apr 2, 2021Updated 4 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- For the analysis of CVE-2013-2028☆30Jun 7, 2018Updated 7 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Oct 27, 2021Updated 4 years ago
- ☆24Dec 10, 2022Updated 3 years ago
- AnnoCTR corpus for detection and linking of entities in cyber threat reports☆26Apr 12, 2024Updated last year
- A series of Bro Scripts created for detection purposes.☆19Nov 18, 2016Updated 9 years ago
- Data retrieved via a quick & dirty web scraper. Currently contains the text data from each page that was dumped as of 2017-03-07. File na…☆21Mar 10, 2017Updated 8 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- 数据来源于https://github.com/xxdef/xitellyou☆18Jul 4, 2020Updated 5 years ago
- Axure9.0/8.0/7.0安装包及汉化插件和元件库☆29May 28, 2019Updated 6 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- ☆24Aug 15, 2020Updated 5 years ago
- cobalt strike stuff I have gathered from around github☆31May 5, 2017Updated 8 years ago
- ☆34Nov 4, 2018Updated 7 years ago
- ☆41Feb 18, 2026Updated 2 weeks ago
- Mikey-Sakke Crypto library and demonstration code for ECCSI/ SAKKE (RFC 6507 and 6508)☆10Jul 16, 2021Updated 4 years ago
- Introductory software reverse engineering tutorial for beginners☆36Jun 2, 2019Updated 6 years ago
- ☆39Dec 4, 2023Updated 2 years ago
- APT34/OILRIG leak☆232Apr 17, 2019Updated 6 years ago
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- Cuckoo Sandbox report parser into ransomware classifier☆11Feb 14, 2019Updated 7 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆387May 11, 2022Updated 3 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- ☆14Feb 7, 2019Updated 7 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- ☆46Jun 14, 2018Updated 7 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- Tools☆10Jul 26, 2021Updated 4 years ago
- 在线cms识别|旁站|c段|信息泄露|工控|系统|物联网安全|cms漏洞扫描|nmap端口扫描|子域名获取|待续..☆10Apr 23, 2019Updated 6 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- Few-Shot Relation Extraction with AllenNLP☆13Jan 27, 2019Updated 7 years ago
- security course list☆14Sep 18, 2015Updated 10 years ago
- Implementation of our paper "Injecting Knowledge Base Information into End-to-End Joint Entity and Relation Extraction and Coreference Re…☆10Jan 22, 2022Updated 4 years ago
- ☆20Jan 25, 2019Updated 7 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 5 months ago