CrowdStrike Threat Intelligence
☆35Jan 14, 2023Updated 3 years ago
Alternatives and similar repositories for CSIntel
Users that are interested in CSIntel are comparing it to the libraries listed below
Sorting:
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Python tool build around GreyNoise's alpha/public API☆11Dec 20, 2018Updated 7 years ago
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- Falcon Integration Gateway (FIG)☆23Mar 5, 2026Updated 2 weeks ago
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated last week
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- Collect SIEM logs from the Mimecast API using Python. Currently supports multiple endpoints. Use this to be able to easily and quickly fo…☆11Apr 4, 2024Updated last year
- Volatility plugins created by the author☆44Oct 2, 2015Updated 10 years ago
- Incident Response Forensic Framework☆612Nov 20, 2019Updated 6 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago
- Python IOC Editor☆65Mar 10, 2015Updated 11 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Improved auto-away monitoring for Nest Thermostats☆15Oct 12, 2014Updated 11 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 3 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- ☆15Aug 8, 2017Updated 8 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Sep 17, 2025Updated 6 months ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Feb 19, 2015Updated 11 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆43Nov 27, 2022Updated 3 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- This Django application is port the AdminLTE Template for easy integration into Django Framework☆11Jul 3, 2020Updated 5 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 7 months ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago