Search the Community
Showing results for tags 'threat intel'.
Found 4 results
OSINT Tools collections: Verification Toolset : https://start.me/p/ZGAzN7/verification-toolset Mapping & Monitoring : https://start.me/p/7k4BnY/mapping-monitoring Tools: https://start.me/p/Wrrzk0/tools Search Engines: https://start.me/p/b56G5Q/search-engines Social Media Dashboard : https://start.me/p/m6MbeM/social-media-intelligence-dashboard Threat Intel, OSINT and malware investigation resources : https://start.me/p/rxRbpo/ti AML Toolbox : https://start.me/p/rxeRqr/aml-toolbox Technisette collection : https://start.me/p/wMdQMQ/tools Ph055a collection : https://github.com/Ph055a/OSINT-Collection
Source: https://www.welivesecurity.com/2019/09/09/backdoor-stealth-falcon-group/ Interesting... some overlap and use of RU infrastructure.. Curious, has anyone found the SHA256 eqv of the SHA-1 (Yea.. I know) mentioned in the article? Just hashes would suffice.
DISCLAIMER - I don't work for, or endorse this job posting. However, I know the CISO well and is on a look out for awesome talent to build unique services in the region. if you are interested, reach out to him directly. (see below) https://www.linkedin.com/posts/hussain-alkhalsan-ciso-65ab76a_ladies-gentlemen-if-you-are-an-information-activity-6565933167730098176-smFd