There are 155 repositories under threat-intelligence topic.
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Defund the Police.
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
The recursive internet scanner for hackers. 🧡
Open Cyber Threat Intelligence Platform
Collection of Cyber Threat Intelligence sources from the deep and dark web
An authoritative list of awesome devsecops tools with the help from community experiments and contributions.
IntelOwl: manage your Threat Intelligence at scale
YARA signature and IOC database for my scanners and tools
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Phishing catcher using Certstream
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Indicators of Compromise from Amnesty International's cyber investigations
Utilities for Sysmon
ThePhish: an automated phishing email analysis tool
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
The Correlated CVE Vulnerability And Threat Intelligence Database API
Repositório criado com intuito de reunir expressões regulares dentro do contexto Brasil
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
A resource containing all the tools each ransomware gangs uses
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
DaProfiler is an OSINT tool allowing you to collect certain information about yourself in order to rectify by rgpd requests the traces you may have left on the net. DaProfiler is indeed able to recover: Addresses, Social media accounts, e-mail addresses, mobile / landline number, jobs.
A collection of resources for Threat Hunters
Extract and aggregate threat intelligence.
Awesome Security lists for SOC/CERT/CTI
Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.