ameihm0912 / geomodelLinks
IP geolocation for authentication events with MozDef
☆10Updated 6 years ago
Alternatives and similar repositories for geomodel
Users that are interested in geomodel are comparing it to the libraries listed below
Sorting:
- Isolated, Scalable, & Lightweight Environment for Training☆111Updated 6 years ago
- Dockerfiles for NSM tools☆84Updated 8 years ago
- (OBSOLETE) Plugins for Bro☆53Updated 7 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆145Updated 2 years ago
- Docker container for MISP☆96Updated 7 years ago
- Threat Intelligence APIs☆280Updated 2 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 9 years ago
- Engine of MineMeld☆140Updated 2 years ago
- Sandia Cyber Omni Tracker (SCOT)☆249Updated 9 months ago
- Bro/Zeek integration with osquery☆94Updated 4 years ago
- Indicator Extractor☆140Updated 7 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Updated 7 years ago
- Bro IDS programs collection.☆146Updated 5 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- Threat Feed Aggregation, Made Easy☆168Updated 5 years ago
- Bro-IDS scripts☆50Updated 8 years ago
- A framework for receiving and redistributing abuse feeds☆124Updated 5 years ago
- Misc. Bro scripts☆64Updated 8 years ago
- Multithreaded threat Intelligence gathering built with Python3☆175Updated 7 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆66Updated 7 years ago
- ☆64Updated 3 years ago
- Logging plugin to bro to send logs to a Kafka broker☆20Updated 7 years ago
- Feed for verious malicious IPs such as malware and botnets☆12Updated 9 years ago
- Improvements of/over the original rule2alert☆56Updated 10 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Time-Machine Dynamic Bulk Packet Recorder☆36Updated 4 months ago
- Bro Snippets☆21Updated 10 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆86Updated 5 months ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year