abhinavbom / Threat-Intelligence-Hunter
TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs. The idea behind the tool is to facilitate searching and storing of frequently added IOCs for creating your own local database of indicators.
☆150Updated 11 months ago
Alternatives and similar repositories for Threat-Intelligence-Hunter:
Users that are interested in Threat-Intelligence-Hunter are comparing it to the libraries listed below
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- Understanding ATT&CK Matrix for Enterprise☆80Updated 6 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- Tools for the Computer Incident Response Team☆144Updated 8 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Hunting IOCs all day every day...☆86Updated last year
- A modular Python application to pull intelligence about malicious files☆121Updated 4 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆148Updated 10 years ago
- STIX Visualization Tool☆108Updated 6 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 3 months ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 4 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- Indicator Extractor☆139Updated 6 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 10 months ago
- Cyber Threat Intelligence Feeds☆95Updated 8 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Django web interface for managing Yara rules☆192Updated 6 years ago
- Malware/IOC ingestion and processing engine☆105Updated 6 years ago
- Multithreaded threat Intelligence gathering built with Python3☆174Updated 7 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- A utility repo to assist with converting between MISP and STIX formats☆68Updated 4 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Threat Intelligence APIs☆279Updated last year
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 4 years ago
- ☆202Updated 2 years ago
- Various Bro scripts☆96Updated 8 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago