TheHive: a Scalable, Open Source and Free Security Incident Response Platform
翻译 - TheHive:可扩展,开源和免费的安全事件响应平台
Real-time HTTP Intrusion Detection
翻译 - 实时HTTP入侵检测
Cortex: a Powerful Observable Analysis and Active Response Engine
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to U...
翻译 - 策展情报与来自世界各地的分析师合作,为乌克兰寻求额外免费威胁情报的组织提供有用的信息。乌克兰斯拉瓦。荣耀属于乌克兰。
#Awesome#Awesome Security lists for SOC/CERT/CTI
Automatically created C2 Feeds
Repository of YARA rules made by Trellix ATR Team
#Awesome#Awesome list of keywords and artifacts for Threat Hunting sessions
The OSINT Omnibus (beta release)
Bringing you the best of the worst files on the Internet.
本项目致力于收集网上公开来源的威胁情报,主要关注信誉类威胁情报(如IP/域名等),以及事件类威胁情报。
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities,...
翻译 - 渗透测试,CTF和战争游戏的工具。
Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security related information) from text. It uses grammars rather than regexes ...
Extract indicators of compromise from text, including "escaped" ones.
翻译 - 从文本中提取危害指标,包括“转义的”。
Open Dataset of Cobalt Strike Beacon metadata (2018-2022)
Historical list of {Cobalt Strike,NanoHTTPD} servers
#计算机科学#BlackBerry Threat Research & Intelligence
Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)
Explore Indicators of Compromise Automatically