Digging Deeper in cyber security and threat hunting
-
Updated
Feb 6, 2024 - Go
Digging Deeper in cyber security and threat hunting
Browser Forensic Extractor
An implementation of ConfigMapTemplate in support of running Bro under Kubernetes. https://www.ixiacom.com/company/blog/threat-hunting-%C2%A0scale-part-one-series
Download domain data from the Centralized Zone Database Service
Masters thesis in cyber security project on malicious domains detection. Scanning agent. Mirror from GitLab.
The Threat Intelligence Swiss Army Knife
Masters thesis in cyber security on malicious domains detection. Center core API. Mirror from GitLab.
Yara io scanning library for Golang
mal-moonshine main goal is allowing fine grained searches across publicly available sandboxes (like Hybrid-Analysis)
It provides a simple way to interact with the Odin API and access various services related to cybersecurity, certificates, and more
TLS certificate transparency monitoring for everybody
twitter IOC hunter written in golang. Which is based on the twitter-scarpper[https://github.com/n0madic/twitter-scraper] package of golang. Currently this tool parses the IP,url[Defang and fang both] and hashes.
A CLI client for malware bazaar and urlhaus feed
An SSH honeypot written entirely in Go.
Command-line tool to search for malware samples in various repositories
Provides a multi-platform Graphical User Interface for hashlookup
IntelOwl's client library/SDK in golang.
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
enpoint detection / live analysis & sandbox host / signatures quality test
Add a description, image, and links to the threat-hunting topic page so that developers can more easily learn about it.
To associate your repository with the threat-hunting topic, visit your repo's landing page and select "manage topics."