Tripwire / TARDIS
Threat Analysis, Reconnaissance, and Data Intelligence System
☆121Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for TARDIS
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆148Updated 6 months ago
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 8 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- Harbinger Threat Intelligence☆82Updated 8 years ago
- Bro scripts to be shared with the community☆109Updated 11 years ago
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- Some IR notes☆73Updated 8 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 6 years ago
- A Framework for managing Cyber Threat Intelligence.☆5Updated 6 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- ☆72Updated 3 years ago
- Script for generating Bro intel files from pdf or html reports☆75Updated 8 years ago
- STIX Visualization Tool☆107Updated 6 years ago
- Hunting IOCs all day every day...☆83Updated last year
- The Seeker of IOC☆129Updated 4 years ago
- Malware/IOC ingestion and processing engine☆103Updated 6 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 8 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆184Updated last year
- Docker container for MISP☆96Updated 6 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 2 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 7 years ago
- ☆76Updated 2 years ago