Repository intended to allow users to leverage site fingerprints within their environments for threat detection and threat hunting
-
Updated
May 15, 2024
Repository intended to allow users to leverage site fingerprints within their environments for threat detection and threat hunting
Asset inventory of over 800 public bug bounty programs.
Collection of Cyber Threat Intelligence sources from the deep and dark web
Zeek-Formatted Threat Intelligence Feeds
🤖 Bot to get the last Cyber Security information in a Microsoft Teams channel 🏴☠️
IOCs that appear in this repository are meant to be long-lasting indicators of compromise.
Automatically created C2 Feeds
Open Cyber Threat Intelligence Platform
Write-ups for CTF-like, CyberSec training platforms (BTLO, CyberDefenders) | Repository of forensic artifacts which are useful in real world and CTF investigations
Automated threat intel feed parsing and consolidation💻👾🤖
Threat Hunting queries for various attacks
Parser for the JSON database included in metasploit-framework that emits a CSV file of modules keyed by vulnerability IDs and references. NOTE: Superseded by git_vul_driller linked below.
A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat intelligence.
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
Chista | Open Threat Intelligence Framework
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
IntelOwl: manage your Threat Intelligence at scale
Live Feed of C2 servers, tools, and botnets
Extracted Yara rules from Windows Defender mpavbase and mpasbase
Add a description, image, and links to the threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the threat-intelligence topic, visit your repo's landing page and select "manage topics."