Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Threa...
翻译 - Malwoverview是第一个响应工具,可在包含恶意软件样本,特定恶意软件样本,可疑URL和域的目录中执行初始和快速分类。此外,它还允许下载样本并将其发送到主要的在线沙箱。
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well a...
翻译 - 威胁追踪虚拟机(VM):一种完全可自定义的,基于Windows的开源发行版,专注于威胁情报分析和攻击,旨在为情报和恶意软件分析人员以及威胁猎人提供快速启动和运行的机会。
Actionable analytics designed to combat threats
This repository contains indicators of compromise (IOCs) of our various investigations.
A collection of intelligence about Log4Shell and its exploitation activity.
翻译 - 有关 Log4Shell 及其开发活动的情报集合。
This script will automatically set up an OSINT workstation starting from a Ubuntu OS.
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
#计算机科学#BlackBerry Threat Research & Intelligence
A reverse search tool for OSINT (Open Source Intelligence) gathering & facial recognition via Google Custom Search & Google Vision API's.
Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack
Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.
Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.
A BASH script to automate simple tasks related to static malware analysis
A collection of Go tools I make while I learn a little about GoLang.
IOCs that appear in this repository are meant to be long-lasting indicators of compromise.
A new way for you to structure your threat content.
Repositório criado para compartilhar ferramentas utilizadas para caça a ameaças (CTI) sobre atores de ameaças e enriquecimento de IOCs coletadas destes.
YoungerSibling is an OSINT command-line tool designed for educational purposes, featuring web scraping, DNS lookups, EXIF data extraction, and username availability checks to help users learn and exp...
Publicly available threat intelligence reports