YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (+29.41%)
IronNetTRThreat research and reporting from IronNet's Threat Research Teams
Stars: ✭ 36 (+111.76%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+3876.47%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+20400%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+364.71%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+40382.35%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (+623.53%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (+305.88%)
Misp DashboardA dashboard for a real-time overview of threat intelligence from MISP instances
Stars: ✭ 142 (+735.29%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+423.53%)
HarpoonCLI tool for open source and threat intelligence
Stars: ✭ 679 (+3894.12%)
Python IocextractDefanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (+1664.71%)
ThreatingestorExtract and aggregate threat intelligence.
Stars: ✭ 439 (+2482.35%)
OSINT-BrazucaRepositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Stars: ✭ 508 (+2888.24%)
Vulnerability Data ArchiveWith the hope that someone finds the data useful, we periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
Stars: ✭ 63 (+270.59%)
Threatbus🚌 The missing link to connect open-source threat intelligence tools.
Stars: ✭ 139 (+717.65%)
Misp TrainingMISP trainings, threat intel and information sharing training materials with source code
Stars: ✭ 185 (+988.24%)
VfeedThe Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+4758.82%)
IntelowlIntel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+12335.29%)
Open-source-tools-for-CTIPublic Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (+435.29%)
GDPatrolA Lambda-powered Security Orchestration framework for AWS GuardDuty
Stars: ✭ 50 (+194.12%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (+29.41%)
connectorsOpenCTI connectors
Stars: ✭ 135 (+694.12%)
OsweepDon't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+1223.53%)
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (+1405.88%)
pybinaryedgePython 3 Wrapper for the BinaryEdge API https://www.binaryedge.io/
Stars: ✭ 16 (-5.88%)
BesafeBeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (+23.53%)
mail to mispConnect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Stars: ✭ 61 (+258.82%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+311.76%)
Otx mispImports Alienvault OTX pulses to a MISP instance
Stars: ✭ 45 (+164.71%)
SysmontoolsUtilities for Sysmon
Stars: ✭ 903 (+5211.76%)
Sweetie DataThis repo contains logstash of various honeypots
Stars: ✭ 163 (+858.82%)
DnsmorphDomain name permutation engine written in Go
Stars: ✭ 148 (+770.59%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (+5.88%)
Awesome CybersecurityCurated list of awesome cybersecurity companies and solutions.
Stars: ✭ 77 (+352.94%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (+329.41%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (+47.06%)
OpenctiAuthors
Stars: ✭ 2,165 (+12635.29%)
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (+1805.88%)
ioc-fangerFang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Stars: ✭ 47 (+176.47%)
sqhunterA simple threat hunting tool based on osquery, Salt Open and Cymon API
Stars: ✭ 64 (+276.47%)
Cyber-SecurityThis repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach it.
Stars: ✭ 42 (+147.06%)
robot hacking manualRobot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (+894.12%)
pyetiPython bindings for Yeti's API
Stars: ✭ 15 (-11.76%)
SentryPeerA distributed peer to peer list of bad actor IP addresses and phone numbers collected via a SIP Honeypot.
Stars: ✭ 108 (+535.29%)
trjExecute any command in other's computer using a trojan horse coded and compiled in C. Just for educational purpose.
Stars: ✭ 21 (+23.53%)
log4j-detectorLog4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (+3558.82%)
phomberPhomber is infomation grathering tool that reverse search phone numbers and get their details, written in python3.
Stars: ✭ 59 (+247.06%)