AlienVault-OTX / OTX-Apps-TAXII
Alienvault OTX TAXII connector
☆56Updated 8 years ago
Alternatives and similar repositories for OTX-Apps-TAXII
Users that are interested in OTX-Apps-TAXII are comparing it to the libraries listed below
Sorting:
- Alienvault OTX Bro IDS Connector☆75Updated 9 years ago
- automate your MISP installs☆68Updated 4 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- ☆49Updated 4 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆42Updated 8 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 4 years ago
- Sysmon Splunk App☆47Updated 6 years ago
- Volatility plugins developed and maintained by the community☆21Updated 7 months ago
- Expert Investigation Guides☆51Updated 4 years ago
- ☆55Updated 3 years ago
- ☆35Updated 4 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Updated last year
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Hunting IOCs all day every day...☆86Updated last year
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆38Updated 2 years ago
- An OpenTAXII Configuration for MISP☆82Updated 2 years ago
- Command line interface to Carbon Black Response☆38Updated 5 years ago
- A Splunk app to use MISP in background☆110Updated 2 months ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago
- Carbon Black Feeds☆72Updated 2 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- CB API scripts for IR, administration, etc.☆32Updated 5 years ago
- AuditParser☆60Updated 11 years ago
- ☆39Updated 5 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 10 months ago
- A collection of typical false positive indicators☆55Updated 4 years ago