CrowdStrike Threat Intelligence
☆35Jan 14, 2023Updated 3 years ago
Alternatives and similar repositories for CSIntel
Users that are interested in CSIntel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- Python tool build around GreyNoise's alpha/public API☆11Dec 20, 2018Updated 7 years ago
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- Falcon Integration Gateway (FIG)☆25Mar 5, 2026Updated last month
- THOR APT Scanner User Manual☆21Apr 22, 2026Updated last week
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- Collect SIEM logs from the Mimecast API using Python. Currently supports multiple endpoints. Use this to be able to easily and quickly fo…☆11Apr 4, 2024Updated 2 years ago
- A Python package to search & delete messages from mailboxes in Office 365 using Microsoft Graph API☆25Feb 15, 2022Updated 4 years ago
- Volatility plugins created by the author☆44Oct 2, 2015Updated 10 years ago
- Incident Response Forensic Framework☆612Nov 20, 2019Updated 6 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Mar 5, 2016Updated 10 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python IOC Editor☆66Mar 10, 2015Updated 11 years ago
- Little Ida pro gimmick, to use pip from python.☆10Jun 28, 2015Updated 10 years ago
- Script for forensic analysis of the OS X Continuity☆20Jul 7, 2018Updated 7 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Improved auto-away monitoring for Nest Thermostats☆15Oct 12, 2014Updated 11 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 3 years ago
- General scripts for random stuff☆38Oct 29, 2021Updated 4 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Collection of data sources that can be used to provide context to security events☆26Jun 30, 2015Updated 10 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Sep 17, 2025Updated 7 months ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- Prompts for ChatGPT 4 useful for developers, cybersecurity professionals, hackers and IT workers☆12Mar 20, 2023Updated 3 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Feb 19, 2015Updated 11 years ago
- Yara rules☆21Mar 27, 2023Updated 3 years ago
- Command-line tool to identify useragents that bypasses proxy restrictions☆13Oct 23, 2025Updated 6 months ago