Skip to content
View BushidoUK's full-sized avatar
🔎
🔎

Organizations

@curated-intel
Block or Report

Block or report BushidoUK

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb

C# 140 20 Updated Dec 3, 2020

Collection of Cyber Threat Intelligence sources from the deep and dark web

4,143 743 Updated Aug 6, 2024

https://blog.bournemouth2600.org/2024/01/local-thread-hijacking.html

C 1 Updated Jan 18, 2024

Cyber Underground General Intelligence Requirements

JSON 84 7 Updated Feb 2, 2024

The Threat Actor Profile Guide for CTI Analysts

87 12 Updated Jul 15, 2023

A repository for tracking events related to the MOVEit Transfer Cl0p Campaign

66 5 Updated Jul 19, 2023

BinaryAlert: Serverless, Real-time & Retroactive Malware Detection.

Python 1,400 187 Updated Dec 12, 2023

DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted from malware includes items such as addresses, passwords, fi…

Python 291 59 Updated Jun 6, 2024

Indexes for SANS Courses and GIAC Certifications

TeX 219 65 Updated May 26, 2024

Volatility 3.0 development

Python 2,448 431 Updated Aug 7, 2024

Trace Labs OSINT Linux Distribution based on Kali.

HTML 652 110 Updated Aug 20, 2023

Liberating dem proprietary APT implants

C 22 3 Updated Dec 17, 2019

An open project to list all publicly known cloud vulnerabilities and CSP security issues

301 62 Updated Jul 31, 2024

A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence

575 63 Updated Apr 4, 2024

International Cybersecurity Incidents for In-House CTI Analysts #StandWithUkraine #GlorytoUkraine DONATE TO: NOVA UKRAINE at novaukraine.org. Talk content provided by Xena Olsen @ch33r10

7 1 Updated Jun 5, 2023

AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation

Python 1,846 259 Updated Apr 3, 2023

Collection of YARA rules written during my free time outside of work.

YARA 5 Updated Jan 6, 2022

Files vetted, and approved for public release

53 15 Updated Nov 30, 2023

Tools for investigating Log4j CVE-2021-44228

Python 95 12 Updated Dec 23, 2021

Sophos-originated indicators-of-compromise from published reports

YARA 526 112 Updated Aug 7, 2024

Operational information regarding the log4shell vulnerabilities in the Log4j logging library.

Python 1,892 608 Updated Jun 15, 2022

A collection of intelligence about Log4Shell and its exploitation activity.

Python 182 37 Updated Mar 4, 2022

Log4j test victim code

Java 3 Updated Dec 12, 2021

A MITRE ATT&CK Lookup Tool

Python 41 4 Updated Apr 25, 2024

A visualized overview of the Initial Access Broker (IAB) cybercrime landscape

106 9 Updated Oct 22, 2021

Sample queries for Advanced hunting in Microsoft 365 Defender

Jupyter Notebook 1,898 524 Updated Feb 17, 2022
Next