Yelp / threat_intel
Threat Intelligence APIs
☆273Updated last year
Related projects: ⓘ
- CIF v3 -- the fastest way to consume threat intelligence☆181Updated last year
- DPS' Lightweight Investigation Notebook☆421Updated 8 months ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆95Updated 8 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆148Updated 3 months ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆144Updated 10 years ago
- ☆200Updated last year
- Threat Feed Aggregation, Made Easy☆166Updated 4 years ago
- Honeypot Intelligence with Splunk☆252Updated 5 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆227Updated 6 years ago
- File Scanning Framework☆285Updated 3 years ago
- Sandia Cyber Omni Tracker (SCOT)☆244Updated last year
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Bro scripts written by CrowdStrike Services☆145Updated 3 years ago
- An open source framework for enterprise level automated analysis.☆393Updated 2 years ago
- Multithreaded threat Intelligence gathering built with Python3☆168Updated 6 years ago
- A framework for receiving and redistributing abuse feeds☆117Updated 4 years ago
- 16,432 Free Yara rules created by☆378Updated 5 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆139Updated last year
- CRITs Services Collection☆182Updated 3 years ago
- STIX Visualization Tool☆107Updated 6 years ago
- A Python library for parsing, manipulating, and generating STIX content.☆239Updated 2 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆174Updated 3 years ago
- Docker container for MISP☆96Updated 6 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆196Updated 7 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆280Updated 6 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆234Updated 3 years ago
- Protocol Analysis/Decoder Framework☆487Updated last year
- ☆306Updated 7 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆121Updated 9 years ago