CrowdStrike Threat Intelligence
☆35Jan 14, 2023Updated 3 years ago
Alternatives and similar repositories for CSIntel
Users that are interested in CSIntel are comparing it to the libraries listed below
Sorting:
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Falcon Integration Gateway (FIG)☆23Updated this week
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- Collect SIEM logs from the Mimecast API using Python. Currently supports multiple endpoints. Use this to be able to easily and quickly fo…☆11Apr 4, 2024Updated last year
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- HECTOR☆20Mar 3, 2017Updated 8 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- THOR APT Scanner User Manual☆20Jan 30, 2026Updated last month
- ☆28Feb 13, 2017Updated 9 years ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆13May 18, 2021Updated 4 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 2 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- Script for forensic analysis of the OS X Continuity☆20Jul 7, 2018Updated 7 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Mar 5, 2016Updated 9 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 4 years ago
- Converts exported results of CAPA tool from .json format to another formats supporting by different tools.☆22Feb 15, 2022Updated 4 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- IcedID Decryption Tool☆28May 7, 2021Updated 4 years ago
- Code for modeling and managing credentials in Metasploit, implemented as a Rails Engine☆29Feb 9, 2026Updated 2 weeks ago
- Incident Response Forensic Framework☆611Nov 20, 2019Updated 6 years ago
- CAPE Auto-Hardened Installer☆26Jan 28, 2026Updated last month
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- Command-line tool to identify useragents that bypasses proxy restrictions☆11Oct 23, 2025Updated 4 months ago
- ☆24Feb 2, 2026Updated 3 weeks ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Apr 15, 2018Updated 7 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago