A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
-
Updated
Dec 1, 2024 - Shell
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Asset inventory of over 800 public bug bounty programs.
Bringing you the best of the worst files on the Internet.
A (nearly) production ready Dockered MISP
A comprehensive, high-quality URL shorteners domain list for whitelist/allowlist or blacklist/blocklist purposes, utilized by NextDNS, ControlD, RethinkDNS, dnslow.me, and other OSINT projects.
Enhance your malware detection with WAF + YARA (WAFARAY)
🔍 Discover if a domain is resolvable or blocked by secure DNS and Ad-blocking services, and experience the innovative idea of DaaS - DNS as an Intelligence Service.
Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.
Shell Script to download NRD(Newly Registered Domain) list for free
A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-systems.com/
Threat-informed defense for cloudnative: Reference Implementation of a so-called Honeycluster - for kind (and GKE, RKE2, AKS)
Scripts to deploy and update MISP in air-gapped environments
Library of blueprints usable in MISP Workflows
CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd
MISP decaying models
Adds an IP Address feed (CIDR) into Check Point Objects via a URL
Anomy is a Tor anonymiser to aid in Threat Intelligence and Malware Analysis Investigations.
Threat intelligence collecter from twitter Streaming API.
The goal of Engaged Threat is to provide honeypot researchers the ability to hold the attention of an attacker or to induce the attacker to participate in some sort of increased activity.
Integration of Mikrotik RouterOS and Text file Threat Feed (BGP Blackhole) using Quagga
Add a description, image, and links to the threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the threat-intelligence topic, visit your repo's landing page and select "manage topics."