Script auto generate rules with IOC
-
Updated
Oct 28, 2018 - Python
Script auto generate rules with IOC
Repository for the Kingston University threat study
Bunch of scripts helping to investigate smishing URLs
Analyze different types of malware with the use of static and dynamic analysis techniques.
SSH-Honeypot
Notes and practice exam analysis I completed when preparing for my CompTIA Security+ exam
Calculate threat levels based on Capability, Opportunity, Intent ratings
Open Domestic Threat Scanner - LLM Threat-Intelligence
Insight aids in profiling a host by searching several online services for information about an IP or domain name.
A database for captured data (malicious files etc.) from command and control servers.
CyberThreat Monitor (SIEM Lab) with Microsoft Azure is a comprehensive threat monitoring solution built on Azure Sentinel, providing real-time visibility into global cyber threats.
pcap analyser that uses rest api for IP/URL reputation and also for obtaining URL's
threatnote | Cyber Threat Intelligence Notebook
To extract the usernames attempted by a compromised host. This information is obtained from Abuse IP DB, reports' comments.
USB threat evaluation framework for Linux
DiaLog is a powerful Log File Analyzer that can also do passive analysis of malicious IP's Found in web-server Traffic
A proof of concept AWS Lambda Python 3.7 runtime that takes Amazon S3 objects, evaluates against file magic MIME types, and will check existing SHA256 hashes or upload the file to VirusTotal using an API key. The API key is retrieved using security best practices with AWS Secrets Manager cached to reduce API overhead.
Infra, devshells, containers,packages,microvms, custom cases, data science, dataops, etc, which else in our osdfir-spaceship
Distrace is a collection of python scripts that are designed to assist in tracking, analysing, and disrupting malware campaigns that utilise Discord for command & control (C2).
A Python script to generate MITRE ATT&CK Navigator layers from TTPs
Add a description, image, and links to the threat-analysis topic page so that developers can more easily learn about it.
To associate your repository with the threat-analysis topic, visit your repo's landing page and select "manage topics."