Threat Feed Aggregation, Made Easy
☆169Jul 13, 2020Updated 5 years ago
Alternatives and similar repositories for Hippocampe
Users that are interested in Hippocampe are comparing it to the libraries listed below
Sorting:
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,552Nov 26, 2025Updated 3 months ago
- Docker container for MISP☆96Jun 20, 2018Updated 7 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,890Jul 25, 2025Updated 7 months ago
- Documentation of TheHive☆400Sep 20, 2023Updated 2 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆176Mar 23, 2021Updated 4 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54May 3, 2024Updated last year
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,113Feb 14, 2026Updated 2 weeks ago
- Python API Client for TheHive☆237Feb 8, 2026Updated 3 weeks ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆556May 9, 2023Updated 2 years ago
- FAME Automates Malware Evaluation☆929Dec 16, 2025Updated 2 months ago
- A framework for receiving and redistributing abuse feeds☆125Sep 27, 2019Updated 6 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- ☆14May 30, 2018Updated 7 years ago
- Your Everyday Threat Intelligence☆1,954Feb 12, 2026Updated 2 weeks ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Modules for expansion services, enrichment, import and export in MISP and other tools.☆361Updated this week
- A curated list of awesome things related to TheHive & Cortex☆185Oct 9, 2021Updated 4 years ago
- Cortex Analyzers Repository☆476Updated this week
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Dec 5, 2023Updated 2 years ago
- Sandia Cyber Omni Tracker (SCOT)☆253Nov 4, 2024Updated last year
- User guide of MISP☆285Dec 31, 2024Updated last year
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Main MineMeld documentation repo☆379Oct 3, 2017Updated 8 years ago
- CRITs - Collaborative Research Into Threats☆910Jul 29, 2019Updated 6 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆179Nov 16, 2023Updated 2 years ago
- File Scanning Framework☆294Sep 15, 2021Updated 4 years ago
- Specifications used in the MISP project including MISP core format☆53Jan 7, 2026Updated last month
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.☆295Feb 25, 2026Updated last week
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- Community modules for FAME☆65Dec 16, 2025Updated 2 months ago