Check if your IPs, URLs or hosts are potentially malicious or infected.
-
Updated
Feb 12, 2023 - HTML
Check if your IPs, URLs or hosts are potentially malicious or infected.
Splunk alert app for exporting indicators from Splunk to Anomali ThreatStream.
Script for automatically create a case in The Hive and start Cortex analyzers adapted to fit the observables.
Python3 wrapper for the GreyNoise API
Tracking APT IOCs
Set of Maltego transforms to query the MITRE ATT&CK dataset.
This is where i host my blog. Fell free to contribute ideas and whatnot
Official repository for CIC-PolyglOT, a data exchange layer for communicating with multiple OT protocols.
Skilled and experienced cybersecurity analyst in identifying and mitigating security threats, Penetration testing, and developing security protocols.Excellent problem-solving and analytical skills,with a commitment to staying current on industry trends and best practices. Looking to leverage expertise in a challenging & dynamic cybersecurity roles
🌐 Destroyer Browser is a 🔒 privacy-focused, 🚀lightweight web browser built and Python. Browse seamlessly with features like tabbed browsing, OSINT tools integration. Prioritize security with automatic 🧹 data removal on exit. Explore the world of open-source intelligence effortlessly. 🔍🚀 #WebBrowser #Privacy #OSINT
Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programming, Web App Security, Cloud Security, Devsecops, Ethical Hacking, Social Engineering, Privacy, Incident Response, Threat Assestment, Personal Security, Ai Security, Android Security, Iot Security, Standards.
MISP Chrome plugin for adding and looking up indicators
A set of bindings to VirusTotal's private API
Tools for working with FIRST IEP (Information Exchange Policy) objects
This analyzer helps you investigate suspicious emails received from known or unknown senders to ensure that their email addresses aren't compromised.
My dissertation has as its content the collection of CTI data from multiple sources, the conversion of this data into STIX2 format, their entry into a database, their analysis in terms of quality criteria, and finally their classification into basic categories of cyber threats and stages of Kill Chain(KC).
Consumes emails from an imap server, hashes, stores them, and sends a notification
Add a description, image, and links to the threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the threat-intelligence topic, visit your repo's landing page and select "manage topics."