Threat Analysis, Reconnaissance, and Data Intelligence System
☆129Aug 28, 2015Updated 10 years ago
Alternatives and similar repositories for TARDIS
Users that are interested in TARDIS are comparing it to the libraries listed below
Sorting:
- Scripts for Bro IDS and ELK Stack☆57Sep 2, 2015Updated 10 years ago
- Threat Intelligence APIs☆281Aug 14, 2023Updated 2 years ago
- This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiat…☆39Jul 24, 2014Updated 11 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆52Jan 25, 2018Updated 8 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆117Aug 9, 2018Updated 7 years ago
- ☆519Jan 26, 2021Updated 5 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Wireless Forensics Framework In Python☆20Jan 29, 2017Updated 9 years ago
- Honeypot Intelligence with Splunk☆255Oct 18, 2018Updated 7 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- A Python library for parsing, manipulating, and generating STIX content.☆247Nov 24, 2021Updated 4 years ago
- integrating bro into yara☆33Dec 9, 2014Updated 11 years ago
- A simple tool for bulk adding/updating/removing tags from AWS resources.☆13Jan 8, 2016Updated 10 years ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆456Jul 2, 2023Updated 2 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- Automater - IP URL and MD5 OSINT Analysis☆553Aug 13, 2024Updated last year
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 9 months ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- ☆305May 28, 2017Updated 8 years ago
- Docker Container for Scumblr (github.com/netflix/scumblr)☆14Jul 13, 2016Updated 9 years ago
- OpenSOC Apache Hadoop Code☆582Feb 19, 2020Updated 6 years ago
- Data Analysis and Visualization Linux Toolset☆58Jul 1, 2017Updated 8 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆151Jun 3, 2014Updated 11 years ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Jul 10, 2019Updated 6 years ago
- Capture the flag - security challenges☆13Feb 29, 2016Updated 10 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Fast Incident Response☆1,999Mar 5, 2026Updated 2 weeks ago
- Integrate Zeek with Alienvault OTX☆25Sep 11, 2020Updated 5 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago