Community driven repository of Playbooks and Apps for ThreatConnect.
☆74Nov 5, 2025Updated 4 months ago
Alternatives and similar repositories for threatconnect-playbooks
Users that are interested in threatconnect-playbooks are comparing it to the libraries listed below
Sorting:
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Feb 17, 2026Updated 3 weeks ago
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- ☆29Nov 10, 2016Updated 9 years ago
- IBM QRadar Ansible Collection☆25Mar 2, 2026Updated last week
- Collaborative Open Playbook Standard☆159Dec 29, 2025Updated 2 months ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Apr 14, 2019Updated 6 years ago
- A tool for detecting sensitive data in code repositories☆18Feb 25, 2026Updated last week
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- DefectDojo Documentation☆17Oct 10, 2021Updated 4 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- ☆16Feb 11, 2019Updated 7 years ago
- Simple python wrapper for the Robtex API (see https://www.robtex.com/api/).☆13Apr 17, 2021Updated 4 years ago
- Scumblr instructions with custom search providers for monitoring malicous content☆17Nov 18, 2017Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- EXIF-based command and control PoC☆15Mar 20, 2020Updated 5 years ago
- A curated list of awesome forensic analysis tools and resources☆16Oct 3, 2018Updated 7 years ago
- Integration with Slack API☆15Dec 10, 2023Updated 2 years ago
- Graylog package build recipes☆18Feb 5, 2026Updated last month
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Jun 6, 2017Updated 8 years ago
- Heimdall Lite 2.0 is a JavaScript based security results viewer and review tool supporting multiple security results formats, such as: In…☆21Feb 11, 2022Updated 4 years ago
- Identity developer dashboard☆28Updated this week
- CTI database generator and public dataset☆22Jan 12, 2020Updated 6 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Alienvault OTX TAXII connector☆57Apr 26, 2017Updated 8 years ago
- ☆25Feb 2, 2026Updated last month
- Tools for VirusTotal☆37Nov 29, 2012Updated 13 years ago
- Security Monitoring using Wazuh, published by Packt☆37Mar 2, 2026Updated last week
- Python command line tool used for generating GIAC Certification indexes.☆29Jul 17, 2023Updated 2 years ago
- OpenCTI.BR ThreatFeeds Public Repository☆122Mar 3, 2026Updated last week
- THOR MITRE ATT&CK Framework Coverage☆25Jun 15, 2020Updated 5 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- MITRE ATT&CK Framework compliance dashboard and correlation searches that works with Splunk Enterprise Security and ES Content Update☆30Nov 7, 2025Updated 4 months ago
- Ideaslocas Repository☆37May 24, 2021Updated 4 years ago
- CybOX Schemas and Schema Development☆43Jun 1, 2017Updated 8 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago