vhawk19 / automated-threat-intelligent-model
An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering python scripts when integrated with McAfee Advanced Threat Defense and Malware Informaton Sharing Platform can defend against new and futuristic cyber attacks.
☆8Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for automated-threat-intelligent-model
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- ☆34Updated 6 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 2 years ago
- ☆14Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆32Updated 9 months ago
- ☆22Updated 3 years ago
- Virus Total Free - IOC parser and report generator☆22Updated last year
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Hashes of infamous malware☆25Updated last year
- ☆12Updated 3 years ago
- All the useful tools interesting to be used☆20Updated 2 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 2 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆26Updated 2 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆25Updated 8 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 3 years ago
- ☆24Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 4 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Updated 4 years ago
- Pure Honeypots with an automated bash script☆19Updated 3 years ago
- buffer overflow examples☆21Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 4 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 2 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Updated 3 years ago