MISP (core software) - Open Source Threat Intelligence and Sharing Platform
-
Updated
Jul 16, 2025 - PHP
8000
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/
Open Source Cloud Native Application Protection Platform (CNAPP)
All-in-One malware analysis tool.
学习安全运营的记录 | The knowledge base of security operation
Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
Extract and aggregate threat intelligence.
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
Don't Just Search OSINT. Sweep It.
Find phishing kits which use your brand/organization's files and image.
A powerful and user-friendly browser extension that streamlines investigations for security professionals.
🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier🌠. Have fun!😎
Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
A toolkit for Security Researchers
Projects, notes, and write-ups I have done while completing the Google Cybersecurity Certificate
Intelligent threat hunter and phishing servers
Download pcap files from http://www.malware-traffic-analysis.net/
With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant yara rules and ids signatures to detect these indicators.
Add a description, image, and links to the threat-analysis topic page so that developers can more easily learn about it.
To associate your repository with the threat-analysis topic, visit your repo's landing page and select "manage topics."