Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for threat
threat
x
728 search results found
Awesome Malware Analysis
⭐
10,368
Defund the Police.
Wazuh
⭐
8,176
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Crowdsec
⭐
7,468
CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.
Awesome Threat Intelligence
⭐
6,905
A curated list of Awesome Threat Intelligence resources
Misp
⭐
4,835
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Opencti
⭐
4,275
Open Cyber Threat Intelligence Platform
Aptnotes
⭐
3,352
Various public documents, whitepapers and articles about APT campaigns
Apt_cybercriminal_campagin_collections
⭐
3,307
APT & CyberCriminal Campaign Collection
Gau
⭐
3,273
Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl.
Securityonion
⭐
2,589
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Whatsapi
⭐
2,578
Interface to WhatsApp Messenger
Teler
⭐
2,577
Real-time HTTP Intrusion Detection
Malwoverview
⭐
2,492
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
Rita
⭐
2,363
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Opencanary
⭐
1,921
Modular and decentralised honeypot
Dettect
⭐
1,892
Detect Tactics, Techniques & Combat Threats
Hayabusa
⭐
1,800
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Awesome K8s Security
⭐
1,784
A curated list for Awesome Kubernetes Security resources
Msticpy
⭐
1,619
Microsoft Threat Intelligence Security Tools
Data
⭐
1,585
APTnotes data
Yeti
⭐
1,568
Your Everyday Threat Intelligence
Cti
⭐
1,561
Cyber Threat Intelligence Repository expressed in STIX 2.0
Devsecops
⭐
1,451
♾️ Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe 😎
Adversary_emulation_library
⭐
1,419
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Collection Document
⭐
1,416
Collection of quality safety articles. Awesome articles.
Binaryalert
⭐
1,368
BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.
Priv2admin
⭐
1,318
Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.
Ipsum
⭐
1,218
Daily feed of bad IPs (with blacklist hit scores)
Threatpursuit Vm
⭐
1,161
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Awesome Threat Modelling
⭐
1,148
A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for learning Threat modeling and initial phases of security review.
Harpoon
⭐
1,107
CLI tool for open source and threat intelligence
Data Police Shootings
⭐
1,104
The Washington Post is compiling a database of every fatal shooting in the United States by a police officer in the line of duty since 2015.
Threatexchange
⭐
1,093
Trust & Safety tools for working together to fight digital harms.
Dagda
⭐
1,051
a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
Linux Malware Detect
⭐
1,050
Linux Malware Detection (LMD)
Phishing.database
⭐
960
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
Advmlthreatmatrix
⭐
904
Adversarial Threat Landscape for AI Systems
Sec_profile
⭐
885
爬取secwiki和xuanwu.github.io/sec.today,分析安全信息站点、安全趋势
Sysmon Dfir
⭐
872
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
Intelmq
⭐
869
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.
Vfeed
⭐
830
The Correlated CVE Vulnerability And Threat Intelligence Database API
Pytm
⭐
801
A Pythonic framework for threat modeling
Strelka
⭐
767
Real-time, container-based file scanning at enterprise scale
Cyberthreathunting
⭐
755
A collection of resources for Threat Hunters - Sponsored by Falcon Guard
Atomic Threat Coverage
⭐
740
Actionable analytics designed to combat threats
Threat Dragon
⭐
738
An open source threat modeling tool from OWASP
Threatingestor
⭐
730
Extract and aggregate threat intelligence.
Skyark
⭐
725
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
Crits
⭐
713
CRITs - Collaborative Research Into Threats
Curiefense
⭐
693
Curiefense is a unified, open source platform protecting cloud native applications.
Magento Malware Scanner
⭐
661
Scanner, signatures and the largest collection of Magento malware
Community Threats
⭐
649
A place to share attack chains for testing people, process, and technology with the entire community. The largest, public library of adversary emulation and adversary simulation plans! #ThreatThursday
Reversinglabs Yara Rules
⭐
646
ReversingLabs YARA Rules
Barbblock
⭐
627
Chrome extension which blocks requests to sites which have used legal threats to remove themselves from other blacklists.
Combine
⭐
592
Tool to gather Threat Intelligence indicators from publicly available sources
Owasp Threat Dragon Desktop
⭐
586
An installable desktop variant of OWASP Threat Dragon
Opensquat
⭐
576
The openSquat project is an open-source solution for detecting phishing domains and domain squatting. It searches for newly registered domains that impersonate legitimate domains on a daily basis.
Event Forwarding Guidance
⭐
563
Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsacyber
Attack Scripts
⭐
556
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Packet Sniffer
⭐
548
A Network Packet Sniffing tool developed in Python 3.
Security List
⭐
531
Opensource security tools list
Awesome Iocs
⭐
525
A collection of sources of indicators of compromise.
Threagile
⭐
524
Agile Threat Modeling Toolkit
Opensoc
⭐
499
OpenSOC Apache Hadoop Code
Threathunting
⭐
495
Tools for hunting for threats.
Wela
⭐
494
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Siem
⭐
489
SIEM Tactics, Techiques, and Procedures
Easyvpn
⭐
480
Easily connect to a VPN in a country of your choice.
Defi Threat
⭐
467
a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations on decentralized finance
Documentation
⭐
454
Kata Containers version 1.x documentation (for version 2.x see https://github.com/kata-containers/kata-containers
Owasp Threat Dragon
⭐
440
An open source, online threat modelling tool from OWASP
Attack Website
⭐
440
MITRE ATT&CK Website
Scsvs
⭐
439
Smart Contract Security Verification Standard
Mdatp
⭐
429
Microsoft Defender XDR - Resource Hub
Attack Control Framework Mappings
⭐
427
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Open Source Tools For Cti
⭐
422
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Meerkat
⭐
407
A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Cdda Game Launcher
⭐
381
A Cataclysm: Dark Days Ahead launcher with additional features
Icewater
⭐
378
16,432 Free Yara rules created by
Purple Team Exercise Framework
⭐
366
Purple Team Exercise Framework
It Security Lecture
⭐
347
University lecture on "IT Security" as Open Educational Resources material
Labs_campaigns
⭐
339
Misp Training
⭐
339
MISP trainings, threat intel and information sharing training materials with source code
Incubator Spot
⭐
339
Mirror of Apache Spot
Threat Broadcast
⭐
338
威胁情报播报
Tram
⭐
324
Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.
Awesome_threat Hunting
⭐
311
A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.
Gsvsoc_cirt Playbook Battle Cards
⭐
304
Cyber Incident Response Team Playbook Battle Cards
Grafiki
⭐
300
Threat Hunting tool about Sysmon and graphs
Zeek Intelligence Feeds
⭐
287
Zeek-Formatted Threat Intelligence Feeds
Ostrica
⭐
285
Zbang
⭐
272
zBang is a risk assessment tool that detects potential privileged account threats
Peacemaker
⭐
268
PeaceMaker Threat Detection is a Windows kernel-based application that detects advanced techniques used by malware.
Threatplaybook
⭐
266
A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestration
Drawio Threatmodeling
⭐
264
Draw.io libraries for threat modeling diagrams
Eop
⭐
263
The Elevation of Privilege Threat Modeling Game
Awesome Mitre Attack
⭐
261
A curated list of awesome resources related to Mitre ATT&CK™ Framework
Kestrel Lang
⭐
258
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
Elemental
⭐
255
Elemental - An ATT&CK Threat Library
Expose
⭐
249
An Intrusion Detection System library loosely based on PHP IDS
Related Searches
Python Threat (438)
Security Threat (258)
1-100 of 728 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.