DefensePointSecurity / threat_noteLinks
DPS' Lightweight Investigation Notebook
☆430Updated last year
Alternatives and similar repositories for threat_note
Users that are interested in threat_note are comparing it to the libraries listed below
Sorting:
- Threat Intelligence APIs☆278Updated last year
- An open source framework for enterprise level automated analysis.☆395Updated 2 years ago
- Sandia Cyber Omni Tracker (SCOT)☆246Updated 6 months ago
- Threat Feed Aggregation, Made Easy☆168Updated 4 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆465Updated 6 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆501Updated 2 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆246Updated 3 years ago
- 16,432 Free Yara rules created by☆383Updated 6 years ago
- Documentation of TheHive☆397Updated last year
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated 2 years ago
- Machinae Security Intelligence Collector☆523Updated last year
- File Scanning Framework☆292Updated 3 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- A modular Python application to collect intelligence for malicious hosts.☆268Updated 4 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆435Updated 2 years ago
- ☆203Updated 2 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 7 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- Multithreaded threat Intelligence gathering built with Python3☆174Updated 7 years ago
- Documentation of Cortex☆174Updated last year
- Modular file scanning/analysis framework☆618Updated 5 years ago
- Incident Response Forensic Framework☆600Updated 5 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 5 years ago
- DFIRTrack - The Incident Response Tracking Application☆498Updated 8 months ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- Evolving directions on building the best Open Source Forensics VM☆160Updated 6 years ago
- A modular Python application to pull intelligence about malicious files☆122Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago