CrowdStrike Threat Intelligence
☆35Jan 14, 2023Updated 3 years ago
Alternatives and similar repositories for CSIntel
Users that are interested in CSIntel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Python tool build around GreyNoise's alpha/public API☆11Dec 20, 2018Updated 7 years ago
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- Falcon Integration Gateway (FIG)☆23Mar 5, 2026Updated last month
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Volatility plugins created by the author☆44Oct 2, 2015Updated 10 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago
- Python IOC Editor☆66Mar 10, 2015Updated 11 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- Script for forensic analysis of the OS X Continuity☆20Jul 7, 2018Updated 7 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Improved auto-away monitoring for Nest Thermostats☆15Oct 12, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 3 years ago
- The Golang Bitfl1p lookup tool for Project Bitfl1p☆32Jul 15, 2015Updated 10 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- ☆15Aug 8, 2017Updated 8 years ago
- Collection of data sources that can be used to provide context to security events☆26Jun 30, 2015Updated 10 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Sep 17, 2025Updated 6 months ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Prompts for ChatGPT 4 useful for developers, cybersecurity professionals, hackers and IT workers☆12Mar 20, 2023Updated 3 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Feb 19, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- Command-line tool to identify useragents that bypasses proxy restrictions☆13Oct 23, 2025Updated 5 months ago
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆44Nov 27, 2022Updated 3 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 8 months ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago