All Projects → santosomar → who_and_what_to_follow

santosomar / who_and_what_to_follow

Licence: other
Who and what to follow in the world of cyber security

Projects that are alternatives of or similar to who and what to follow

Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+5733.87%)
Mutual labels:  malware, cybersecurity, cyber-security
Intelmq
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (+392.74%)
Mutual labels:  incident-response, malware, cybersecurity
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+4547.58%)
Mutual labels:  malware, cybersecurity, cyber-security
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+445.16%)
Mutual labels:  incident-response, malware, cybersecurity
Ir Rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+150.81%)
Mutual labels:  incident-response, malware, cybersecurity
Opcde
OPCDE Cybersecurity Conference Materials
Stars: ✭ 538 (+333.87%)
Mutual labels:  incident-response, cybersecurity
Cyberchef Recipes
A list of cyber-chef recipes and curated links
Stars: ✭ 619 (+399.19%)
Mutual labels:  incident-response, malware
Ioc Explorer
Explore Indicators of Compromise Automatically
Stars: ✭ 73 (-41.13%)
Mutual labels:  incident-response, cybersecurity
CloudFrontier
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (-17.74%)
Mutual labels:  cybersecurity, cyber-security
Fcl
FCL (Fileless Command Lines) - Known command lines of fileless malicious executions
Stars: ✭ 409 (+229.84%)
Mutual labels:  incident-response, malware
Misp Taxonomies
Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Stars: ✭ 168 (+35.48%)
Mutual labels:  incident-response, malware
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-69.35%)
Mutual labels:  cybersecurity, cyber-security
cuc-wiki
个人教学 Wiki
Stars: ✭ 83 (-33.06%)
Mutual labels:  cybersecurity, cyber-security
Fame
FAME Automates Malware Evaluation
Stars: ✭ 663 (+434.68%)
Mutual labels:  incident-response, malware
Awesome Incident Response
A curated list of tools for incident response
Stars: ✭ 4,753 (+3733.06%)
Mutual labels:  incident-response, cybersecurity
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+12.9%)
Mutual labels:  cybersecurity, cyber-security
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (-66.13%)
Mutual labels:  malware, cybersecurity
Malware-Zoo
Hashes of infamous malware
Stars: ✭ 18 (-85.48%)
Mutual labels:  malware, cybersecurity
RdpCacheStitcher
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+41.94%)
Mutual labels:  incident-response, cybersecurity
Watcher
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (+161.29%)
Mutual labels:  incident-response, cybersecurity
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].