PaloAltoNetworks / ioc-parser
Tool to extract indicators of compromise from security reports in PDF format
☆72Updated 10 months ago
Alternatives and similar repositories for ioc-parser:
Users that are interested in ioc-parser are comparing it to the libraries listed below
- A Splunk app to use MISP in background☆110Updated last month
- Sigma Detection Rule Repository☆87Updated 4 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Carbon Black Feeds☆72Updated 2 years ago
- A utility repo to assist with converting between MISP and STIX formats☆68Updated 4 years ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆81Updated 3 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 4 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆37Updated 2 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Definition, description and relationship types of MISP objects☆97Updated 2 weeks ago
- ☆55Updated 3 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.