PaloAltoNetworks / pan-stixLinks
pan-stix
☆19Updated 7 years ago
Alternatives and similar repositories for pan-stix
Users that are interested in pan-stix are comparing it to the libraries listed below
Sorting:
- Threat Intelligence distribution☆30Updated 9 years ago
- Scripts for making Hubot a CND Sidekick☆59Updated 9 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Updated 11 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 9 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 8 years ago
- MISP - Ansible installation script☆22Updated 6 years ago
- ☆38Updated 6 years ago
- Enrich a host with open source security information☆27Updated 9 years ago
- Bringing DevOps to Forensics☆34Updated 10 years ago
- A collection of bro_scripts and signatures☆26Updated 6 years ago
- ☆64Updated 3 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 7 years ago
- Docker container for MISP☆96Updated 7 years ago
- Detect Phishing with Bro IDS☆18Updated 8 years ago
- Dockerfiles for NSM tools☆84Updated 8 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Updated 9 years ago
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11Updated 10 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- API Tools☆27Updated 9 years ago
- brocon-15 scripts☆13Updated 8 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Updated 7 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆81Updated 9 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago