Main MineMeld documentation repo
☆379Oct 3, 2017Updated 8 years ago
Alternatives and similar repositories for minemeld
Users that are interested in minemeld are comparing it to the libraries listed below
Sorting:
- Engine of MineMeld☆140Feb 15, 2023Updated 3 years ago
- WebUI of MineMeld☆42Mar 16, 2023Updated 2 years ago
- Prototypes for MineMeld nodes☆38Oct 15, 2021Updated 4 years ago
- Ansible playbook for installing MineMeld on Linux☆47Mar 18, 2021Updated 4 years ago
- Threat Feed Aggregation, Made Easy☆169Jul 13, 2020Updated 5 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- MineMeld nodes for MISP☆19Jan 23, 2024Updated 2 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Your Everyday Threat Intelligence☆1,954Feb 12, 2026Updated 3 weeks ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- IronSkillet is a set of day-one configuration templates for PAN-OS to enable alignment with security best practices. See the Quick Start …☆218May 22, 2023Updated 2 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆505Oct 21, 2022Updated 3 years ago
- CRITs - Collaborative Research Into Threats☆910Jul 29, 2019Updated 6 years ago
- Collecting & Hunting for IOCs with gusto and style☆117Aug 9, 2018Updated 7 years ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,891Jul 25, 2025Updated 7 months ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,113Feb 14, 2026Updated 2 weeks ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Detect Tactics, Techniques & Combat Threats☆2,264Jan 21, 2026Updated last month
- FAME Automates Malware Evaluation☆929Dec 16, 2025Updated 2 months ago
- Fast Incident Response☆1,994Feb 17, 2026Updated 2 weeks ago
- Configuration files for the SOF-ELK VM☆1,720Jan 21, 2026Updated last month
- A Powershell incident response framework☆1,639Nov 22, 2022Updated 3 years ago
- 16,432 Free Yara rules created by☆391Jun 1, 2019Updated 6 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,492Jan 12, 2026Updated last month
- The Hunting ELK☆3,912Jun 1, 2024Updated last year
- An informational repo about hunting for adversaries in your IT environment.☆1,854Nov 17, 2021Updated 4 years ago
- Configuration guidance for implementing collection of security relevant Windows Event Log events by using Windows Event Forwarding. #nsac…☆883Nov 17, 2020Updated 5 years ago
- Open Source Security Events Metadata (OSSEM)☆1,288Feb 27, 2023Updated 3 years ago
- Multithreaded threat Intelligence gathering built with Python3☆178Jan 23, 2018Updated 8 years ago
- Incident Response Methodologies☆1,018Aug 2, 2018Updated 7 years ago
- A repository for using windows event forwarding for incident detection and response☆1,299Sep 8, 2025Updated 5 months ago
- Threat Intelligence APIs☆280Aug 14, 2023Updated 2 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- An information security preparedness tool to do adversarial simulation.☆1,137Apr 1, 2019Updated 6 years ago
- Framework and utilities to easily manage and edit Palo Alto Network PANOS devices☆222Jun 16, 2021Updated 4 years ago
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 7 years ago
- A modular Python application to collect intelligence for malicious hosts.☆274Apr 13, 2021Updated 4 years ago
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,552Nov 26, 2025Updated 3 months ago