abhinavbom / Threat-Intelligence-Hunter
TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs. The idea behind the tool is to facilitate searching and storing of frequently added IOCs for creating your own local database of indicators.
☆148Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for Threat-Intelligence-Hunter
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- Tools for the Computer Incident Response Team☆142Updated 7 years ago
- Hunting IOCs all day every day...☆83Updated last year
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 3 years ago
- IOC Management and Visualization Tool☆47Updated last year
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 8 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆121Updated 9 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- Multithreaded threat Intelligence gathering built with Python3☆171Updated 6 years ago
- A modular Python application to pull intelligence about malicious files☆118Updated 3 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆144Updated 10 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 10 years ago
- Understanding ATT&CK Matrix for Enterprise☆79Updated 6 years ago
- Bro scripts to be shared with the community☆109Updated 11 years ago
- Various Bro scripts☆96Updated 8 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆184Updated last year
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆90Updated 7 years ago
- A Splunk app to use MISP in background☆109Updated 3 weeks ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- STIX Visualization Tool☆107Updated 6 years ago
- Threat Alert Logic Repository☆89Updated 5 years ago
- Threat Feed Aggregation, Made Easy☆166Updated 4 years ago
- Malware/IOC ingestion and processing engine☆103Updated 6 years ago
- Cyber Threat Intelligence Feeds☆89Updated 8 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆85Updated last year
- Splunk Boss of the SOC v1 data set.☆111Updated 6 years ago
- Detecting Lateral Movement with Machine Learning☆137Updated 7 years ago