vxunderground / ThreatIntelligenceDiscordBotLinks
Gets updates from various clearnet domains and ransomware threat actor domains
☆394Updated last year
Alternatives and similar repositories for ThreatIntelligenceDiscordBot
Users that are interested in ThreatIntelligenceDiscordBot are comparing it to the libraries listed below
Sorting:
- Awesome list of keywords and artifacts for Threat Hunting sessions☆583Updated 2 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆365Updated last week
- ☆516Updated 8 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆185Updated 6 months ago
- Yet another Ransomware gang tracker☆449Updated last week
- ☆196Updated last year
- Just some lists of Malware Configs☆170Updated 5 months ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆652Updated 2 years ago
- A resource containing all the tools each ransomware gangs uses☆1,055Updated 3 weeks ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆264Updated last week
- Collection of various malicious functionality to aid in malware development☆1,681Updated last year
- CLI tools for forensic investigation of Windows artifacts☆341Updated 7 months ago
- Practical Windows Forensics Training☆667Updated last year
- PowerShell Ransomware Simulator with C2 Server☆486Updated last year
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆367Updated 2 years ago
- 🏴☠️💰 Another Ransomware gang tracker☆214Updated this week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆695Updated 3 weeks ago
- ☆366Updated this week
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆587Updated 8 months ago
- A curated list of awesome malware persistence tools and resources.☆224Updated 6 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 5 months ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆647Updated 11 months ago
- Ransomware leak site monitoring☆312Updated 3 years ago
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- Map tracking ransomware, by OCD World Watch team☆468Updated 3 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆397Updated last month
- Jupyter Notebooks for the Blue Team☆144Updated 3 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆196Updated 11 months ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- ☆494Updated last year