ARCHIVED ce1sus, a threat information database ARCHIVED
☆28Dec 8, 2015Updated 10 years ago
Alternatives and similar repositories for ce1sus
Users that are interested in ce1sus are comparing it to the libraries listed below
Sorting:
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- ☆16Jan 29, 2016Updated 10 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20May 13, 2017Updated 8 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- DRAFT STIX specification documents for version 1.2☆20Oct 3, 2016Updated 9 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆66Mar 6, 2018Updated 7 years ago
- Converting data from services like Censys and Shodan to a common data model☆52Feb 22, 2026Updated last week
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- A project that implements statistical methods for identifying anomalous files☆22Dec 10, 2014Updated 11 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- ☆29Feb 25, 2017Updated 9 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆35Apr 16, 2021Updated 4 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 13 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Parse a report and import the events into MISP☆30Oct 19, 2015Updated 10 years ago
- A collection of bro_scripts and signatures☆27Jun 26, 2019Updated 6 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 2 years ago