InQuest / ThreatIngestorLinks
Extract and aggregate threat intelligence.
☆893Updated last year
Alternatives and similar repositories for ThreatIngestor
Users that are interested in ThreatIngestor are comparing it to the libraries listed below
Sorting:
- Defanged Indicator of Compromise (IOC) Extractor.☆557Updated last year
- A collection of resources for Threat Hunters☆912Updated last year
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆595Updated last week
- Actionable analytics designed to combat threats☆1,005Updated 3 years ago
- Cyber Analytics Repository☆968Updated 7 months ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,174Updated 2 years ago
- A set of Zeek scripts to detect ATT&CK techniques.☆620Updated last year
- A collection of sources of indicators of compromise.☆933Updated 7 months ago
- MISP trainings, threat intel and information sharing training materials with source code☆421Updated 2 weeks ago
- Cortex Analyzers Repository☆468Updated last week
- Your Everyday Threat Intelligence☆1,942Updated last month
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆613Updated 6 years ago
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆571Updated 2 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆570Updated last week
- Online hash checker for Virustotal and other services☆841Updated 9 months ago
- Indicators from Unit 42 Public Reports☆728Updated 4 months ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,104Updated 3 weeks ago
- DFIRTrack - The Incident Response Tracking Application☆530Updated last year
- A Python package to interact with the Mitre ATT&CK Framework☆479Updated 2 years ago
- Repository of YARA rules made by Trellix ATR Team☆622Updated 9 months ago
- Python library using the MISP Rest API☆478Updated last week
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,346Updated last year
- Re-play Security Events☆1,703Updated last year
- Mapping the MITRE ATT&CK Matrix with Osquery☆804Updated 2 years ago
- Open Source Security Events Metadata (OSSEM)☆1,284Updated 2 years ago
- ReversingLabs YARA Rules☆885Updated last month
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆589Updated 2 years ago
- MITRE ATT&CK Website☆556Updated 2 weeks ago
- SIEM Tactics, Techiques, and Procedures☆684Updated 3 weeks ago
- FAME Automates Malware Evaluation☆923Updated 2 weeks ago