certsocietegenerale / abuse_finder
Find abuse contacts for observables
☆69Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for abuse_finder
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- IntelMQ Manager is a graphical interface to manage configurations for IntelMQ framework.☆103Updated 4 months ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆43Updated 3 years ago
- automate your MISP installs☆66Updated 4 years ago
- IntelMQ Tutorial and Introductory Documentation☆14Updated 2 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆142Updated last year
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆31Updated 2 years ago
- Website crawler with YARA detection☆88Updated last year
- Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come on…☆136Updated last month
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆84Updated last week
- Different tools, koen.vanimpe@cudeso.be☆100Updated 3 weeks ago
- Python library for the ArcSight logger REST API☆27Updated 3 years ago
- A utility repo to assist with converting between MISP and STIX formats☆64Updated 3 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆76Updated 3 weeks ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆99Updated 2 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Cyber Intel Management☆46Updated 6 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- ☆33Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- ☆50Updated 6 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆104Updated 6 years ago
- Specifications used in the MISP project including MISP core format☆46Updated last month
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆56Updated last year
- A modular Python application to pull intelligence about malicious files☆118Updated 3 years ago
- Scripts for TheHive.☆22Updated 5 years ago