Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for threat
threat
x
727 search results found
Threatbus
⭐
239
🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.
Robot Detect
⭐
239
Detection script for the ROBOT vulnerability
Misp Taxonomies
⭐
238
Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.
Seasponge
⭐
234
🍍 SeaSponge is an accessible threat modelling tool from Mozilla
Threat Model Cookbook
⭐
229
This project is about creating and publishing threat model examples.
Misp Book
⭐
227
User guide of MISP
Adama
⭐
226
Searches For Threat Hunting and Security Analytics
Analyzer
⭐
222
Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)
Aptmalware
⭐
220
APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples
Manuka
⭐
215
A modular OSINT honeypot for blue teamers
Stix Shifter
⭐
204
This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return results as STIX Observations.
Authtables
⭐
201
AuthTables is a microservice that helps detect "Account Take Over" caused by simple credential theft. If bad actors are stealing your users passwords, AuthTables may be useful.
Security Response Automation
⭐
200
Take automated actions against threats and vulnerabilities.
Ipscrub
⭐
199
IP address anonymizer module for nginx
Apt06202001
⭐
197
Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020
Libtech Auditing Cheatsheet
⭐
194
Machine Learning For Cybersecurity Cookbook
⭐
194
Machine Learning for Cybersecurity Cookbook, published by Packt
Open Network Insight
⭐
187
ONI development has been moved into Apache Software Foundation - Apache Spot (incubating) http://spot.apache.org/
Tau Tools
⭐
187
A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit
Pshunt
⭐
185
Powershell Threat Hunting Module
Misp Dashboard
⭐
184
A dashboard for a real-time overview of threat intelligence from MISP instances
Blackbook
⭐
179
Blackbook of malware domains
Bearded Avenger
⭐
176
CIF v3 -- the fastest way to consume threat intelligence
Androidmalware_2019
⭐
176
Popular Android threats in 2019
Malware Indicators
⭐
174
Citizen Lab Malware Reports
Rastrea2r
⭐
173
Collecting & Hunting for IOCs with gusto and style
Cve 2017 8759
⭐
171
CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.
Hunter
⭐
170
A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.
Continuous Threat Modeling
⭐
154
A Continuous Threat Modeling methodology
Hippocampe
⭐
153
Threat Feed Aggregation, Made Easy
Playbook_viewer
⭐
153
Surveyor
⭐
151
A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.
Wazuh Documentation
⭐
151
Wazuh - Project documentation
Patrowlhears
⭐
150
PatrowlHears - Vulnerability Intelligence Center / Exploits
Yourfritz
⭐
148
dynamic package management for AVM routers
Blueledger
⭐
147
A list of my personal projects
Pie
⭐
147
📫 The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365
Tiq Test
⭐
145
Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds
Misp Maltego
⭐
145
Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Graylog Plugin Threatintel
⭐
142
Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases
Mobile Threat Catalogue
⭐
141
NIST/NCCoE Mobile Threat Catalogue
Sweetie Data
⭐
139
This repo contains logstash of various honeypots
Logesp
⭐
137
Open Source SIEM (Security Information and Event Management system).
Oriana
⭐
136
Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
Owasp Cloud Security
⭐
135
OWASP Cloud Security - Enabling conversations through threat and control stories
Threat Modeling Templates
⭐
134
Microsoft Threat Modeling Template files
Docbleach
⭐
133
🚿 Sanitising your documents, one threat at a time. — Content Disarm & Reconstruction Software
Threat Intel
⭐
130
Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS
Threatnote
⭐
129
threatnote.io | Cyber Threat Intelligence Notebook
Docker Misp
⭐
129
Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing
Rapid Threat Model Prototyping Docs
⭐
128
This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.
Amazon Guardduty Hands On
⭐
128
This repo can be used to quickly get hands on experience with Amazon GuardDuty by guiding you through enabling the detector, generating a variety of findings, and remediating those findings with Lambda functions.
Dynamite Nsm
⭐
128
DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat detection
Exist
⭐
128
EXIST is a web application for aggregating and analyzing cyber threat intelligence.
Blue Teaming With Kql
⭐
125
Repository with Sample KQL Query examples for Threat Hunting
Node Webcrypto Ossl
⭐
123
A WebCrypto Polyfill for Node in TypeScript built on OpenSSL.
Elasticintel
⭐
121
Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.
Awesome
⭐
121
A curated list of awesome things related to TheHive & Cortex
Secrepo
⭐
119
Sweet, sweet, secrepo.com html.
Threatelligence
⭐
118
Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect intelligence from custom or public sources. Automatically updates feeds and tries to further enhance data for dashboards.
Threat Intelligence Hunter
⭐
118
TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs. The idea behind the tool is to facilitate searching and storing of frequently added IOCs for creating your own local database of indicators.
Threatintel
⭐
117
Dfak
⭐
109
The Digital First Aid Kit has moved to Gitlab:
Threatspec
⭐
109
threatspec - continuous threat modeling, through code
Thethe
⭐
106
thethe
Osquery_queries
⭐
104
Cisco Orbital - Osquery queries by Talos
Rttm
⭐
103
Real Time Threat Monitoring Tool
Openvasreporting
⭐
101
OpenVAS Reporting: Convert OpenVAS XML report files to reports
Blacklist Scripts
⭐
101
Various IP blacklisting scripts for Linux and OpenWRT
Docker Misp
⭐
101
Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing
Gaussrf
⭐
101
Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl and Filter Urls With OpenRedirection or SSRF Parameters.
Rthvm
⭐
101
Resolvn Threat Hunting Virtual Machine
Manati
⭐
100
A web-based tool to assist the work of the intuitive threat analysts.
Sharppack
⭐
100
An Insider Threat Toolkit
Firebasescanner
⭐
99
The scripts helps security analsts to identify misconfigured firebase instances.
Malware Signatures
⭐
97
Yara rules for malware families seen as part of targeted threats project
Mstic
⭐
96
Microsoft Threat Intelligence
Elevation Of Privilege
⭐
96
An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game
Pki Io
⭐
95
Main repo with docs etc.
Jeopardize
⭐
93
a low(zero) cost threat intelligence&response tool against phishing domains
Ransomware Reports
⭐
91
This repo is a collection of Ransomware reports from vendors, researchers, etc.
Vue Chessboard
⭐
90
Chessboard vue component to load positions, create positions and see threats
Mimir
⭐
89
OSINT Threat Intel Interface - CLI for HoneyDB
Phishingkittracker
⭐
88
PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in #phishingkit , maintained by @neonprimetime
Tylium
⭐
87
Primary data pipelines for intrusion detection, security analytics and threat hunting
Hands On Artificial Intelligence For Cybersecurity
⭐
85
Hands-On Artificial Intelligence for Cybersecurity, publised by Packt
Malwareanalysis In Pdf
⭐
83
Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the PDF format enables to attacker to carry out malicious code on the computer system for user exploitation.
Malcontrol
⭐
83
Malware Control Monitor
Monarcappfo
⭐
83
MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU
Malware Feed
⭐
82
Bringing you the best of the worst files on the Internet.
Osint_sources
⭐
82
Simuland
⭐
81
Cloud Templates and scripts to deploy mordor environments
Qradio
⭐
81
QRadio ~ Best Threat Intelligence Radio ~ Tune In!
Pyvfeed
⭐
81
Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions
Cloudflare Block
⭐
78
Bash script that automatically activates Cloudflare's "I'm Under Attack!" mode if the server detects an attack.
Breachnotes
⭐
78
Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.
Buttinsky
⭐
77
Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will provide an open source framework for automated botnet monitoring. The modular design will allow full customization of the used protocols, the monitoring clients behavior, how we log the collected information, processing of the data to analyze the botnets purpose, size and threat and how the monitoring task are distributed between dedicated nodes.
Threat_intelligence
⭐
76
Threat-Intelligence Feeds & Tools & Frameworks
Threat Dragon Desktop
⭐
76
Desktop variant of OWASP Threat Dragon
Stig
⭐
76
Structured Threat Intelligence Graph
Related Searches
Python Threat (438)
Security Threat (258)
101-200 of 727 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.