austin-taylor / flare
An analytical framework for network traffic and behavioral analytics
☆449Updated last year
Related projects ⓘ
Alternatives and complementary repositories for flare
- An open source framework for enterprise level automated analysis.☆393Updated 2 years ago
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆423Updated 10 months ago
- Documentation of TheHive☆393Updated last year
- DPS' Lightweight Investigation Notebook☆423Updated 10 months ago
- Automated deployment scripts for the RockNSM network hunting distribution.☆446Updated last year
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆237Updated 3 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆537Updated last year
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆463Updated 5 years ago
- An information security preparedness tool to do adversarial simulation.☆1,102Updated 5 years ago
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆408Updated last year
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆556Updated 5 months ago
- Main MineMeld documentation repo☆380Updated 7 years ago
- File Scanning Framework☆289Updated 3 years ago
- ☆1,051Updated 5 years ago
- ☆208Updated last year
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆976Updated 2 weeks ago
- DFIRTrack - The Incident Response Tracking Application☆482Updated 2 months ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆196Updated 8 years ago
- Threat Feed Aggregation, Made Easy☆166Updated 4 years ago
- Python API Client for TheHive☆218Updated last week
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆491Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆429Updated last year
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆175Updated 3 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆184Updated last year
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,138Updated last year
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆718Updated 4 years ago
- A set of Zeek scripts to detect ATT&CK techniques.☆565Updated 4 months ago
- Actionable analytics designed to combat threats☆972Updated 2 years ago
- 16,432 Free Yara rules created by☆380Updated 5 years ago
- Cortex Analyzers Repository☆434Updated last week