Ukraine-Cyber-Operations
ThreatIngestor
Ukraine-Cyber-Operations | ThreatIngestor | |
---|---|---|
10 | 1 | |
907 | 786 | |
-0.1% | 1.9% | |
3.4 | 7.6 | |
10 months ago | 3 months ago | |
YARA | Python | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Ukraine-Cyber-Operations
- GitHub - curated-intel/Ukraine-Cyber-Operations: Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
- Ukraine-Cyber-Operations: Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence.
- GitHub - Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
- Russia-Ukraine Cyberwar 2022
- Ukraine curated cyber intel
- Ukraine Cyber Operations: Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence.
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. (github/curated-intel)
- Collection of Ukraine related OSINT
ThreatIngestor
What are some alternatives?
StandWithUkraine - #StandWithUkraine banner and related documents
C2IntelFeeds - Automatically created C2 Feeds
sysmon-config - Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
MISP - MISP (core software) - Open Source Threat Intelligence and Sharing Platform
YaraHunter - 🔍🔍 Malware scanner for cloud-native, as part of CI/CD and at Runtime 🔍🔍
spiderfoot - SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
harpoon
Cerebro - Scripts and lists to help generate YARA friendly string mutations
misp-warninglists - Warning lists to inform users of MISP about potential false-positives or other information in indicators
awesome-malware-analysis - Defund the Police.
StalkPhish - StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.