abhinavbom / Threat-Intelligence-HunterLinks
TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs. The idea behind the tool is to facilitate searching and storing of frequently added IOCs for creating your own local database of indicators.
☆151Updated last year
Alternatives and similar repositories for Threat-Intelligence-Hunter
Users that are interested in Threat-Intelligence-Hunter are comparing it to the libraries listed below
Sorting:
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆54Updated 4 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 9 years ago
- Tools for the Computer Incident Response Team☆143Updated 8 years ago
- Understanding ATT&CK Matrix for Enterprise☆80Updated 7 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆148Updated 10 years ago
- Hunting IOCs all day every day...☆86Updated last year
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- STIX Visualization Tool☆109Updated 6 years ago
- A modular Python application to pull intelligence about malicious files☆122Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Multithreaded threat Intelligence gathering built with Python3☆174Updated 7 years ago
- Malware/IOC ingestion and processing engine☆105Updated 6 years ago
- Various Bro scripts☆96Updated 8 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 3 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- ☆203Updated 2 years ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 11 months ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated last week
- Threat Feed Aggregation, Made Easy☆168Updated 4 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆112Updated 6 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated 2 years ago
- CrowdStrike Falcon Orchestrator provides automated workflow and response capabilities☆186Updated last year
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- A framework for receiving and redistributing abuse feeds☆124Updated 5 years ago