Best practices in threat intelligence
☆50Nov 6, 2022Updated 3 years ago
Alternatives and similar repositories for best-practices-in-threat-intelligence
Users that are interested in best-practices-in-threat-intelligence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Azure function to insert MISP data in to Azure Sentinel☆34Oct 19, 2022Updated 3 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆34Jan 1, 2023Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- Splunk Add-on for PowerShell provides field extraction for PowerShell event logs.☆17Feb 1, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆182Jun 23, 2024Updated last year
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Aug 6, 2025Updated 8 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆132Oct 17, 2020Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆70Nov 11, 2023Updated 2 years ago
- my emacs config☆12Dec 22, 2016Updated 9 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆104Dec 29, 2023Updated 2 years ago
- Specifications used in the MISP project including MISP core format☆54Jan 7, 2026Updated 3 months ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago
- Defanged Indicator of Compromise (IOC) Extractor.☆575Aug 28, 2024Updated last year
- Object-oriented programming language for writing smart contracts on all platforms. Built to work alongside BenchChain distributed virtua…☆11Apr 17, 2018Updated 8 years ago
- TAXII server implementation in Python from EclecticIQ☆213Mar 12, 2026Updated last month
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Download all of a given user's public Pastebin pastes☆33Apr 16, 2025Updated last year
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 7 months ago
- BlackBerry Threat Research & Intelligence☆97Oct 20, 2023Updated 2 years ago
- Example configuration for tethering Adafruit FONA with Linux's PPP daemon.☆13Jun 7, 2016Updated 9 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Jul 21, 2021Updated 4 years ago
- Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.☆294Mar 23, 2026Updated 3 weeks ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Jan 8, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Golang-based subdomain miner leveraging certificate transparency logs☆73Aug 8, 2023Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 9 years ago
- ☆26Jun 20, 2018Updated 7 years ago
- Collection of scripts for different malware analysis tasks☆76Jul 15, 2019Updated 6 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆120Apr 14, 2021Updated 5 years ago