MISP (core software) - Open Source Threat Intelligence and Sharing Platform
-
Updated
May 14, 2024 - PHP
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Open source cloud native security observability platform. Linux, K8s, AWS Fargate and more.
All-in-One malware analysis tool.
学习安全运营的记录 | The knowledge base of security operation
Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
Extract and aggregate threat intelligence.
Don't Just Search OSINT. Sweep It.
Find phishing kits which use your brand/organization's files and image.
Collection of Threat Models
A powerful and user-friendly browser extension that streamlines investigations for security professionals.
🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier🌠. Have fun!😎
A toolkit for Security Researchers
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
Intelligent threat hunter and phishing servers
Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases
Download pcap files from http://www.malware-traffic-analysis.net/
This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant yara rules and ids signatures to detect these indicators.
Projects, notes, and write-ups I have done while completing the Google Cybersecurity Certificate
Add a description, image, and links to the threat-analysis topic page so that developers can more easily learn about it.
To associate your repository with the threat-analysis topic, visit your repo's landing page and select "manage topics."