Check if your IPs, URLs or hosts are potentially malicious or infected.
-
Updated
Feb 12, 2023 - HTML
Check if your IPs, URLs or hosts are potentially malicious or infected.
PowerShell module for creating and managing Sysinternals Sysmon config files.
CTI Reporter is a small flask wiki to help index threat intelligence data
The Threat Intelligence Fetching Script is a versatile Python tool designed to effortlessly retrieve threat intelligence feeds from specified URLs while ensuring security and flexibility. With real-time progress tracking, dynamic handling of various threat feed formats (e.g., CSV, JSON), and robust features such as IP filtering and URL validation,
Interactive Cyber Threat Dashboard visualizing real-time cyber threats and vulnerabilities in Puerto Rico, blending advanced analytics and user-centric design.
A repository to reunite interesting content about cybersecurity (content in development)
A blog about cyber security and life. coming. soonish.
OpenSource /Malware Analysis Pipeline System
threatnote | Cyber Threat Intelligence Notebook
Digging Deeper in cyber security and threat hunting
The goal of this project is to utilize the knowledge from the course to write a voting machine in Rust and embed backdoors inside of it that would allow a knowledgeable attacker to cheat in the election. Then, we would be given another team’s voting machine to attack, attempting to find all of the vulnerabilities (intentional or not) in their syste
QuickDraw (QD) is a Chrome extension that enables users to instantly select and redirect Indicators of Compromise (IOCs) like IPs, file hashes, and email addresses to their favorite OSINT tools directly from the browser
This script reads a list of URLs from a CSV file, analyzes them using the VirusTotal API, and generates a report with detailed threat information. It saves the results to a new CSV file and maintains detailed logs for debugging purposes.
🎣 phishing analysis 101
A set of bindings to VirusTotal's private API
Tool created to user search related to identify fake user based on official company user account.
My dissertation has as its content the collection of CTI data from multiple sources, the conversion of this data into STIX2 format, their entry into a database, their analysis in terms of quality criteria, and finally their classification into basic categories of cyber threats and stages of Kill Chain(KC).
Add a description, image, and links to the threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the threat-intelligence topic, visit your repo's landing page and select "manage topics."