DeepBlueCLI
A PowerShell module for threat hunting via Windows Event Logs
Using Cymon API v2 Based on Serverless framework pay-what-you-use provider agnostic Description: honeyλ allows you to create and monitor fake HTTP endpoints automatically. You can then place these URL honeytokens in e.g. your inbox, documents, browser history, or embed them as {hidden} links in your web pages. (Note: honeybits can be used for spreading breadcrumbs across your systems to lure the attackers toward your traps). Depending on how and where you implement honeytokens, you may detect human attackers, malicious insiders, content scrapers, or bad bots. This application is based on Serverless framework and can be deployed in different cloud providers such as Amazon Web Services (AWS), Microsoft Azure, IBM OpenWhisk or Google Cloud (Only tested on AWS; the main function may need small changes to support other providers). If your cloud provider is AWS, it automatically
A PowerShell module for threat hunting via Windows Event Logs
Taxii2 server for interacting with taxii services.
A collection of Yara rules for the Burp Yara-Scanner extension to identify malicious software on websites.
RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.
A comprehensive and unrestricted dataset of security incidents for research and decision-making
Check if an IP address was used as a Tor relay on a given date.