uforia / MatterBotLinks
MatterBot is a two-part extensible Python bot framework that provides a scheduled feed of information sources to your Mattermost channel(s), and listens in channel(s) for commands to trigger the appropriate module(s).
☆36Updated 3 weeks ago
Alternatives and similar repositories for MatterBot
Users that are interested in MatterBot are comparing it to the libraries listed below
Sorting:
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆33Updated 5 months ago
- URL fingerprinting made easy☆89Updated last year
- Collection of videos of Raids on Cybercriminals☆20Updated 6 months ago
- ☆22Updated 3 weeks ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- ☆53Updated last month
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated 3 weeks ago
- God Mode Detection Rules☆134Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated 2 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆23Updated last year
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 8 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 2 months ago
- ☆63Updated 2 years ago
- VTC - Velociraptor Timeline Creator☆18Updated last year
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆26Updated 2 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- Assess Windows OS for security misconfigurations and hardening opportunities.☆34Updated last year
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆85Updated 3 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆53Updated this week
- Evtx Log (xml) Browser☆56Updated 2 years ago