This repository consolidates all unique IOCs ever released at rstthreats. Updated at least once a day.
-
Updated
Jun 3, 2024 - Python
Cybersecurity involves protecting systems, networks, and data from cyber threats. This field encompasses a wide range of practices and technologies designed to safeguard information from unauthorized access, attacks, damage, or theft. Cybersecurity includes preventive measures such as firewalls, encryption, and secure coding practices, as well as detection and response strategies like intrusion detection systems and incident response plans. This topic covers the principles, best practices, and latest trends in cybersecurity, including emerging threats and the evolving landscape of cyber defense.
This repository consolidates all unique IOCs ever released at rstthreats. Updated at least once a day.
Security automation content in SCAP, Bash, Ansible, and other formats
This repository contains Bug Bounty writeups
IOCs that appear in this repository are meant to be long-lasting indicators of compromise.
Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Repository intended to allow users to leverage site fingerprints within their environments for threat detection and threat hunting
An auto-updating list of shodan dorks with info on the amount of results they return!
OSINT tool
Threat Hunting queries for various attacks
Cloud-native SIEM for intelligent security analytics for your entire enterprise.
This repository by Sequoia Heights MS offers an integrated solution featuring a probe and client. Our blocklists, sourced from our honeypot network, are freely available. We provide a sync client for up-to-date protection and a probe tool for contributing new data.
Building a consolidated RSS feed for articles about cyberattacks
Ransomware groups posts
Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS
SkillCraft Technology Task 02 Image Encryption Tool : Pixel Manipulation
SkillCraft Technology Task 01 : Caesar Cipher Encryption/Decryption
Open Breach and Attack Simulation Platform
The NIST Cybersecurity Framework 2.0 outlines steps to be taken by the industry, governement agencies, and small businesses in organization risk management.
Created by The cybersecurity community