abhinavbom / Threat-Intelligence-Hunter
TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs. The idea behind the tool is to facilitate searching and storing of frequently added IOCs for creating your own local database of indicators.
☆149Updated 10 months ago
Alternatives and similar repositories for Threat-Intelligence-Hunter:
Users that are interested in Threat-Intelligence-Hunter are comparing it to the libraries listed below
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆147Updated 10 years ago
- Hunting IOCs all day every day...☆86Updated last year
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- A modular Python application to pull intelligence about malicious files☆119Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Tools for the Computer Incident Response Team☆144Updated 7 years ago
- Multithreaded threat Intelligence gathering built with Python3☆173Updated 7 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆121Updated 3 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 4 years ago
- Understanding ATT&CK Matrix for Enterprise☆80Updated 6 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated last year
- Threat Feed Aggregation, Made Easy☆167Updated 4 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆85Updated last year
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Various Bro scripts☆96Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆71Updated 9 months ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 2 months ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Malware/IOC ingestion and processing engine☆104Updated 6 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆241Updated 3 years ago
- STIX Visualization Tool☆107Updated 6 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- Cyber Threat Intelligence Feeds☆94Updated 8 years ago