Detect Tactics, Techniques & Combat Threats
Actionable analytics designed to combat threats
Detect real-time threats and events on OP Stack compatible blockchains
threatspec - continuous threat modeling, through code
A curated list of Awesome Threat Intelligence resources
Your Everyday Threat Intelligence
Microsoft Threat Intelligence Security Tools
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
翻译 - SpiderFoot可以自动执行OSINT收集,因此您可以专注于分析。
Tools for hunting for threats.
Popular Android threats in 2019
Take automated actions against threats and vulnerabilities.
Scans PHP files for malwares and known threats
翻译 - 扫描PHP文件中的恶意软件和已知威胁
Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started by @attritionorg
Detect threats with log data and improve cloud security posture
翻译 - 使用日志数据检测威胁并改善云安全状况
A free utility that finds malware, adware and other security threats
Chessboard vue component to load positions, create positions and see threats
zBang is a risk assessment tool that detects potential privileged account threats
翻译 - zBang是一种风险评估工具,可检测潜在的特权帐户威胁
Yara rules for malware families seen as part of targeted threats project
Machine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we atte...
The purpose of the Identifying Security Threats working group is to enable stakeholders to have informed confidence in the security of open source projects. We do this by collecting, curating, and com...
Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown
🍓📡🍍Monitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.)
A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities