Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/
-
Updated
Feb 23, 2026 - Python
Cowrie SSH/Telnet Honeypot https://docs.cowrie.org/
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Open Source Cloud Native Application Protection Platform (CNAPP)
All-in-One malware analysis tool.
Extract and aggregate threat intelligence.
Xue Xi An Quan Yun Ying De Ji Lu | The knowledge base of security operation
Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.
A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigating security risks.
A web honeypot library to create vulnerable-looking endpoints to detect and mislead attackers
A powerful and user-friendly browser extension that streamlines investigations for security professionals.
Don't Just Search OSINT. Sweep It.
Find phishing kits which use your brand/organization's files and image.
Yi Ge Ji Cheng Duo Yuan Wei Xie Qing Bao De Ju He Ping Tai ,Wei An Quan Yan Jiu Ren Yuan He Yun Wei Tuan Dui Ti Gong Shi Shi Wei Xie Qing Bao Cha Xun He Bo Bao Fu Wu ;Ji Cheng A Li Yun WAFZhu Dong Lan Jie Wei Xie IP,Diao Yu You Jian Shi Shi Jian Ce ,Ji Cheng AIDeng Duo Xiang Chang Yong An Quan Lei Gong Ju
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
This is a collection of hacking and pentesting scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier. Have fun!
ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.
Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
Projects, notes, and write-ups I have done while completing the Google Cybersecurity Certificate
Add a description, image, and links to the threat-analysis topic page so that developers can more easily learn about it.
To associate your repository with the threat-analysis topic, visit your repo's landing page and select "manage topics."