327 skills found · Page 1 of 11
cowrie / CowrieCowrie SSH/Telnet Honeypot https://docs.cowrie.org/
MISP / MISPMISP (core software) - Open Source Threat Intelligence and Sharing Platform
deepfence / ThreatMapperOpen Source Cloud Native Application Protection Platform (CNAPP)
activecm / Rita LegacyReal Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
CYB3RMX / Qu1cksc0peAll-in-One malware analysis tool.
mandiant / ThreatPursuit VMThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
TalEliyahu / Awesome Security NewslettersPeriodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, vulnerabilities, and analysis of trending threats and attacks
eliasgranderubio / Dagdaa tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
alvin-tosh / Malware Exhibit🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
InQuest / ThreatIngestorExtract and aggregate threat intelligence.
satan1a / TheRoadOfSO学习安全运营的记录 | The knowledge base of security operation
seekbytes / IPAGUI analyzer for deep-diving into PDF files. Detect malicious payloads, understand object relationships, and extract key information for threat analysis.
StrangerealIntel / CyberThreatIntelAnalysis of malware and Cyber Threat Intel of APT and cybercriminals groups
xtiankisutsa / MARA FrameworkMARA is a Mobile Application Reverse engineering and Analysis Framework. It is a toolkit that puts together commonly used mobile application reverse engineering and analysis tools to assist in testing mobile applications against the OWASP mobile security threats.
0x783kb / Threat Analysis Handbook常见的攻击行为监测特征及方法,涵盖端点和流量,未包含PowerShell和Sysmon。预祝运营生活愉快!
utmstack / UTMStackEnterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.
activecm / RitaReal Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
TalEliyahu / Threat Model ExamplesA collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
Azr43lKn1ght / DFIR LABSDFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital Forensics, Incident Response, Malware Analysis and Threat Hunting.
utkusen / BaitrouteA web honeypot library to create vulnerable-looking endpoints to detect and mislead attackers