SHolzhauer / elastic-tip
Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common format into Elasticsearch with the main goal of being used by the Security solution.
☆27Updated 5 months ago
Alternatives and similar repositories for elastic-tip:
Users that are interested in elastic-tip are comparing it to the libraries listed below
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated last month
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Sharing Threat Hunting runbooks☆24Updated 5 years ago
- automate your MISP installs☆66Updated 4 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 2 months ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- Using QRadar API☆20Updated 6 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆93Updated 2 years ago
- Scripts to inject demo data and network traffic into an existing Alienvault/OSSIM installation☆21Updated 7 years ago
- Learn about a network from a pcap file or reading from an interface☆28Updated 9 months ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 2 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated last week
- ☆34Updated 4 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- Incident Response Network Tools☆24Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆68Updated last year
- A collection of my presentations, blog posts, and other contributions to the information security community☆24Updated 3 months ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Kestrel Jupyter Notebook Kernel☆9Updated last year