SEKOIA.IO Documentation - The Intelligence-Driven SaaS SIEM
-
Updated
Jul 4, 2024 - Python
SEKOIA.IO Documentation - The Intelligence-Driven SaaS SIEM
List of phishing_scam_domains
List of malware and other malicious artifacts sha256 hashes
List of malware and other malicious artifacts md5 hashes
Lists of addresses of the most active C2, Botnets, Zombies, Scanners in European Cyber Space
MITRE ATT&CK Website
IntelOwl: manage your Threat Intelligence at scale
txt2stix is a Python script that is designed to identify and extract IoCs and TTPs from text files, identify the relationships between them, convert them to STIX 2.1 objects, and output as a STIX 2.1 bundle.
This repository holds: 1) custom STIX 2.1 Objects DOGESEC have created, and 2) generic STIX 2.1 Objects that are imported to different DOGESEC products.
Repository contains malware IP addresses of C2 infrastructure
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
Overivew of all cyber incidients in Norway
Creating raw shellcode by writing a stack only Rust program, includes an injector!
A python module for working with ATT&CK
Top ATT&CK Techniques provides defenders with a systematic approach to prioritizing ATT&CK techniques.
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
The DNA test for websites
Threat Intel Platform for T-POTs
A cross-platform, open-source framework for mapping live cyber threats on a global scale.
Add a description, image, and links to the cyber-threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threat-intelligence topic, visit your repo's landing page and select "manage topics."