GitHub Trends
10.4K subscribers
15.5K links
See what the GitHub community is most excited about today.

A bot automatically fetches new repositories from https://github.com/trending and sends them to the channel.

Author and maintainer: https://github.com/katursis
Download Telegram
#shell #case_management #cyber_security #endpoint_security #information_security #intrusion_detection_system #monitoring #network_security #security #security_tools #threat_hunting

Security Onion 2.4 is a new version of a security tool that helps protect your network. It has features like alerts, dashboards, and detection tools to find and stop threats. You can also use it to hunt for suspicious activity and analyze network traffic. The benefit to you is that it makes it easier to keep your network safe from cyber attacks and provides clear visuals and tools to manage security effectively. You can find more details on how to download, install, and use it through the provided links.

https://github.com/Security-Onion-Solutions/securityonion
👎1
#other #cti #cyberhunter #darkweb #deepweb #threat_intelligence

deepdarkCTI is a free project that collects and shares cyber threat intelligence (CTI) from the deep and dark web, helping you stay aware of hidden cyber threats like stolen data, ransomware, and hacker activities. It gathers information from places like Telegram, Discord, hacker forums, and ransomware sites to provide useful indicators and patterns of cyber attacks. You can join their Telegram group to discuss and suggest new sources or support the project with donations. Using deepdarkCTI helps you detect threats early, improve your cybersecurity decisions, and protect your organization from cyber attacks more effectively.

https://github.com/fastfire/deepdarkCTI
#yara #awesome_list #blueteam #blueteam_tools #cti #detection #detection_engineering #dfir #hacktools #incident_response #ioc #iocs #ir #ransomware #redteam #rmm #security #siem #soc #threat_hunting #threat_intelligence

You can access comprehensive security detection lists and threat hunting resources that help identify malicious activity across your infrastructure. These curated collections include indicators like suspicious file hashes, domain names, IP addresses, and behavioral patterns organized by threat type—from ransomware and phishing to command-and-control servers and vulnerable drivers. By integrating these lists into your security tools like SIEM platforms and endpoint detection systems, you gain immediate visibility into known threats while learning detection methodologies through guides and YARA rules. This accelerates your ability to hunt for compromises, validate security controls, and stay current with emerging attack techniques without building detection logic from scratch.

https://github.com/mthcht/awesome-lists