There are 2 repositories under cyber-intelligence topic.
Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.
Amber Heard Social Network Analysis of Disinformation/Influence Operations, Bots, & Crime Across-Platforms. - Twitter, Reddit, YouTube, Instagram, Change.org, Facebook, Tumblr, TikTok. To create Foundations to Help victims of bots, cyberabuse, domestic abuse, coercive control, crime, & disinformation operations. We want to Save Lives & help partners create systems to help online - including specialized and accurate rescue, quality custom, data analysis, social network analysis, forensics, research, and public safety technologies - with focus on the victim primarily & her environment.
Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious domain and IPv4 lists.
My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.
Social Network Analysis to Help Rescue targeted women/people from abuse, exploitation, harassment, disinformation/influence operations, and threats. Uses webscraping, NLU, cyber intelligence, statistics, botnet detection, clustering, and methods. Female public figure-standard.
Dockerized Reporting Intelligence Framework and Threat Response
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Cyber Loss in Cybersecurity.