vxunderground / ThreatIntelligenceDiscordBotLinks
Gets updates from various clearnet domains and ransomware threat actor domains
☆398Updated last year
Alternatives and similar repositories for ThreatIntelligenceDiscordBot
Users that are interested in ThreatIntelligenceDiscordBot are comparing it to the libraries listed below
Sorting:
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆368Updated last week
- ☆528Updated last month
- Just some lists of Malware Configs☆171Updated 6 months ago
- ☆369Updated last week
- ☆515Updated 9 months ago
- CLI tools for forensic investigation of Windows artifacts☆344Updated 8 months ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆367Updated 2 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆703Updated last month
- Map tracking ransomware, by OCD World Watch team☆469Updated 4 months ago
- A suite of Tools to aid Incidence Response and Live Forensics for - Windows (Powershell) | Linux (Bash) | MacOS (Shell)☆589Updated 9 months ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆397Updated 2 months ago
- ☆196Updated last year
- PowerShell Ransomware Simulator with C2 Server☆486Updated last year
- A resource containing all the tools each ransomware gangs uses☆1,066Updated last week
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆656Updated 2 years ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆269Updated last week
- 🏴☠️💰 Another Ransomware gang tracker☆220Updated last week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆585Updated 2 weeks ago
- Live Feed of C2 servers, tools, and botnets☆667Updated last week
- Jupyter Notebooks for the Blue Team☆145Updated 3 months ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆364Updated 11 months ago
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆714Updated 5 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆198Updated last year
- Ransomware leak site monitoring☆313Updated 3 years ago
- Yet another Ransomware gang tracker☆457Updated last week
- A collection of phishing samples for researchers and detection developers.☆328Updated 6 months ago
- MAL-CL (Malicious Command-Line)☆314Updated 2 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆648Updated last year
- A repository of credential stealer formats☆221Updated last month
- Practical Windows Forensics Training☆670Updated last year