vxunderground / ThreatIntelligenceDiscordBotLinks
Gets updates from various clearnet domains and ransomware threat actor domains
☆407Updated last year
Alternatives and similar repositories for ThreatIntelligenceDiscordBot
Users that are interested in ThreatIntelligenceDiscordBot are comparing it to the libraries listed below
Sorting:
- Just some lists of Malware Configs☆173Updated 10 months ago
- ☆541Updated 2 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆389Updated this week
- Yet another Ransomware gang tracker☆537Updated this week
- CLI tools for forensic investigation of Windows artifacts☆347Updated 3 months ago
- ☆513Updated last year
- Map tracking ransomware, by OCD World Watch team☆479Updated 8 months ago
- Jupyter Notebooks for the Blue Team☆148Updated 7 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆266Updated 2 months ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆369Updated 2 years ago
- ☆379Updated this week
- PowerShell Ransomware Simulator with C2 Server☆493Updated last year
- This repository contains indicators of compromise (IOCs) of our various investigations.☆308Updated 2 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆615Updated 3 months ago
- Ransomware leak site monitoring☆316Updated 3 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆668Updated 2 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆408Updated 6 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆741Updated last week
- ☆195Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆189Updated 10 months ago
- Live Feed of C2 servers, tools, and botnets☆726Updated last week
- A resource containing all the tools each ransomware gangs uses☆1,280Updated 3 weeks ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆405Updated last year
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆673Updated last year
- MAL-CL (Malicious Command-Line)☆319Updated 2 years ago
- A repository of credential stealer formats☆233Updated 5 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆740Updated 3 weeks ago
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆599Updated last year
- A collection of phishing samples for researchers and detection developers.☆362Updated 2 weeks ago
- Ransomware simulation script written in PowerShell. Useful for testing your defenses and backups against real ransomware-like activity in…☆236Updated last year