The-Shadowserver-Foundation / api_utilsLinks
Sample programs to access the API
☆93Updated 5 months ago
Alternatives and similar repositories for api_utils
Users that are interested in api_utils are comparing it to the libraries listed below
Sorting:
- ☆96Updated 3 weeks ago
- Website for ail-typo-squatting library☆66Updated 2 weeks ago
- Docker image for MISP☆134Updated 2 months ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆83Updated last month
- AIL project training materials☆35Updated 3 months ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated 2 years ago
- Standard-Format Threat Intelligence Feeds☆124Updated this week
- Indicators of Compromise☆225Updated last week
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆234Updated 2 weeks ago
- ☆28Updated 4 years ago
- An open source platform to support analysts to organise their case and tasks☆107Updated this week
- A collection of tips for using MISP.☆74Updated 10 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated this week
- Docker configurations for TheHive, Cortex and 3rd party tools☆126Updated 2 years ago
- ☆52Updated last week
- Fast IOC and YARA Scanner☆84Updated 5 years ago
- ☆97Updated 2 months ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆90Updated last month
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆107Updated this week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆52Updated 9 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 2 months ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆131Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆76Updated last week
- Cleanup of older MISP events can require some work until now☆27Updated last month
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆34Updated 2 years ago
- Tools for Wazuh by Juan C. Tello☆15Updated 3 years ago
- ☆27Updated 2 months ago
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Updated last year
- Convert Sigma rules to Wazuh rules☆73Updated last month