ThreatConnect-Inc / threatconnect-playbooksView external linksLinks
Community driven repository of Playbooks and Apps for ThreatConnect.
☆74Nov 5, 2025Updated 3 months ago
Alternatives and similar repositories for threatconnect-playbooks
Users that are interested in threatconnect-playbooks are comparing it to the libraries listed below
Sorting:
- ThreatConnect Exchange App Framework☆24Feb 5, 2026Updated last week
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Feb 11, 2026Updated last week
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- Collaborative Open Playbook Standard☆159Dec 29, 2025Updated last month
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Push-button Security Operations Center using Kubernetes☆13Oct 19, 2016Updated 9 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Apr 14, 2019Updated 6 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 3 years ago
- Comprehensive Cheat Sheet for Rapid7's Insight-IDR LEQL Search Language.☆11Mar 18, 2024Updated last year
- A tool for detecting sensitive data in code repositories☆17Dec 15, 2025Updated 2 months ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- R Package 📦 for using the HaveIBeenPwned.com API☆13Oct 10, 2022Updated 3 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- DefectDojo Documentation☆17Oct 10, 2021Updated 4 years ago
- ☆16Feb 11, 2019Updated 7 years ago
- Scumblr instructions with custom search providers for monitoring malicous content☆17Nov 18, 2017Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- An automated Windows 11 Desktop Packer project that sets up SSH, WinRM, and virtualization additions☆26Mar 23, 2023Updated 2 years ago
- Integration with Slack API☆15Dec 10, 2023Updated 2 years ago
- A curated list of awesome forensic analysis tools and resources☆16Oct 3, 2018Updated 7 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- incident response scripts☆18Mar 4, 2019Updated 6 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 6 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Jun 6, 2017Updated 8 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Mar 25, 2020Updated 5 years ago
- ☆23Feb 2, 2026Updated 2 weeks ago
- CTI database generator and public dataset☆21Jan 12, 2020Updated 6 years ago
- Identity developer dashboard☆28Feb 10, 2026Updated last week
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- The most feature complete PowerShell module available for the Rapid7 Nexpose/InsightVM APIv3☆62Jan 4, 2026Updated last month
- Tools for VirusTotal☆36Nov 29, 2012Updated 13 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Alienvault OTX TAXII connector☆56Apr 26, 2017Updated 8 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Jul 17, 2023Updated 2 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Jun 15, 2020Updated 5 years ago
- Tools to automate AWS Cloud security assessments☆24Mar 26, 2020Updated 5 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago