adulau / pdns-qof
Passive DNS Common Output Format
☆36Updated 8 months ago
Alternatives and similar repositories for pdns-qof:
Users that are interested in pdns-qof are comparing it to the libraries listed below
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 4 months ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- ☆24Updated 2 years ago
- Python module to use the MISP Taxonomies☆29Updated last month
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆33Updated 3 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- ☆33Updated 5 years ago
- IntelMQ command line tool to process events and send out email notifications.☆9Updated this week
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Updated last month
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Definition, description and relationship types of MISP objects☆97Updated 3 weeks ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 8 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆34Updated 4 years ago
- Python IOC Editor☆63Updated 10 years ago
- ☆18Updated 6 years ago
- CyCAT.org taxonomies☆15Updated 3 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago
- Useful scripts, rules etc. for use with YARA☆27Updated 4 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago