misp-osint-collectionCollection of best practices to add OSINT into MISP and/or MISP communities
Stars: ✭ 54 (-97.45%)
rhqRecon Hunt Queries
Stars: ✭ 66 (-96.88%)
iocingestorAn extendable tool to extract and aggregate IoCs from threat feeds
Stars: ✭ 25 (-98.82%)
yara-rulesYara rules written by me, for free use.
Stars: ✭ 13 (-99.39%)
tenssensTenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources.
Stars: ✭ 19 (-99.1%)
SyntheticSunSyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats.
Stars: ✭ 49 (-97.68%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-95.7%)
freki🐺 Malware analysis platform
Stars: ✭ 327 (-84.53%)
Sysmon ConfigSysmon configuration file template with default high-quality event tracing
Stars: ✭ 3,287 (+55.49%)
Misp GalaxyClusters and elements to attach to MISP events or attributes (like threat actors)
Stars: ✭ 276 (-86.94%)
SecurecodeboxsecureCodeBox (SCB) - continuous secure delivery out of the box
Stars: ✭ 279 (-86.8%)
Secretzsecretz, minimizing the large attack surface of Travis CI
Stars: ✭ 279 (-86.8%)
OpenctiAuthors
Stars: ✭ 2,165 (+2.41%)
Stronginjectcompile time dependency injection for .NET
Stars: ✭ 277 (-86.9%)
OnlineCollabora Online is a collaborative online office suite based on LibreOffice technology. This is also the source for the Collabora Office apps for iOS and Android.
Stars: ✭ 278 (-86.85%)
Thehive4pyPython API Client for TheHive
Stars: ✭ 143 (-93.24%)
PolichombrCollaborative malware analysis framework
Stars: ✭ 307 (-85.48%)
Loopback NextLoopBack makes it easy to build modern API applications that require complex integrations.
Stars: ✭ 3,972 (+87.89%)
UrlextractorInformation gathering & website reconnaissance | https://phishstats.info/
Stars: ✭ 341 (-83.87%)
ThehivedocsDocumentation of TheHive
Stars: ✭ 353 (-83.3%)
Rustscan🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+146.83%)
AiodnsbrutePython 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (-82.5%)
Misp DashboardA dashboard for a real-time overview of threat intelligence from MISP instances
Stars: ✭ 142 (-93.28%)
Apt HunterAPT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
Stars: ✭ 297 (-85.95%)
SimplifyAndroid virtual machine and deobfuscator
Stars: ✭ 3,865 (+82.83%)
HuskyciPerforming security tests inside your CI
Stars: ✭ 398 (-81.17%)
WitnessmeWeb Inventory tool, takes screenshots of webpages using Pyppeteer (headless Chrome/Chromium) and provides some extra bells & whistles to make life easier.
Stars: ✭ 436 (-79.38%)
Linux.miraiLeaked Linux.Mirai Source Code for Research/IoC Development Purposes
Stars: ✭ 466 (-77.96%)
MitakaA browser extension for OSINT search
Stars: ✭ 483 (-77.15%)
HosthunterHostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-79.8%)
GosintThe GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).
Stars: ✭ 482 (-77.2%)
CyphonOpen source incident management and response platform.
Stars: ✭ 543 (-74.31%)
IntelmqIntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Stars: ✭ 611 (-71.1%)
Git HoundReconnaissance tool for GitHub code search. Finds exposed API keys using pattern matching, commit history searching, and a unique result scoring system.
Stars: ✭ 602 (-71.52%)
OsmedeusFully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+60.41%)
Deimosc2DeimosC2 is a Golang command and control framework for post-exploitation.
Stars: ✭ 423 (-79.99%)
KlaraKaspersky's GReAT KLara
Stars: ✭ 565 (-73.27%)
FameFAME Automates Malware Evaluation
Stars: ✭ 663 (-68.64%)
SplatMakes things cross-platform
Stars: ✭ 753 (-64.38%)
BluespawnAn Active Defense and EDR software to empower Blue Teams
Stars: ✭ 737 (-65.14%)
TorbotDark Web OSINT Tool
Stars: ✭ 821 (-61.16%)
Awesome Startup😎 All the required resources to build your own startup
Stars: ✭ 702 (-66.79%)
VfeedThe Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (-60.93%)
MalboxesBuilds malware analysis Windows VMs so that you don't have to.
Stars: ✭ 900 (-57.43%)
Cortex4pyPython API Client for Cortex
Stars: ✭ 22 (-98.96%)
TrivyScanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
Stars: ✭ 9,673 (+357.57%)
ApulloA scanner for taking basic fingerprints
Stars: ✭ 22 (-98.96%)
Virustotal ToolsSubmits multiple domains to VirusTotal API
Stars: ✭ 29 (-98.63%)
GitgotSemi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
Stars: ✭ 964 (-54.4%)
Analyst CasefileMaltego CaseFile entities for information security investigations, malware analysis and incident response
Stars: ✭ 41 (-98.06%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (-53.26%)
Otx mispImports Alienvault OTX pulses to a MISP instance
Stars: ✭ 45 (-97.87%)
Pentesting BibleLearn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+324.83%)
BeagleBeagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Stars: ✭ 976 (-53.83%)
YetiYour Everyday Threat Intelligence
Stars: ✭ 1,037 (-50.95%)
MatireMalware Analysis, Threat Intelligence and Reverse Engineering: LABS
Stars: ✭ 55 (-97.4%)
Ioc2rpzioc2rpz is a place where threat intelligence meets DNS.
Stars: ✭ 67 (-96.83%)