Cyber Threat Intelligence Feeds
☆70May 3, 2024Updated last year
Alternatives and similar repositories for intelmq-feeds-documentation
Users that are interested in intelmq-feeds-documentation are comparing it to the libraries listed below
Sorting:
- Cyber Threat Intelligence Feeds☆98Sep 26, 2016Updated 9 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- IntelMQ Tutorial and Introductory Documentation☆15May 26, 2022Updated 3 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- An OpenTAXII Configuration for MISP☆88Sep 29, 2022Updated 3 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,113Feb 14, 2026Updated 2 weeks ago
- Malware/IOC ingestion and processing engine☆109Nov 20, 2018Updated 7 years ago
- IntelMQ Manager is a graphical interface to manage configurations for IntelMQ framework.☆108Dec 3, 2025Updated 3 months ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆144Nov 26, 2018Updated 7 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 2 years ago
- A mapping of used malware names to commonly known family names☆62Feb 21, 2023Updated 3 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- Just random powershell things I've put together.☆37May 7, 2025Updated 9 months ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Nov 11, 2023Updated 2 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- Various android tools from Lingnu Open Source Consulting Ltd.☆14Mar 5, 2013Updated 12 years ago
- Emoji Favicon Toolkit - Set your favicon to emoji using canvas & cache as /favicon.ico with service workers☆16Mar 16, 2019Updated 6 years ago
- A DNS Sinkhole List for testing purposes. (not for use in production systems) - UUID: 0f90ca2c-4b0a-4fbe-b659-449ab30c4284☆19Apr 4, 2021Updated 4 years ago
- Pi Hole Blocklist all in one file☆19May 13, 2020Updated 5 years ago
- A Python library to interface with a cuckoo-modified instance☆23Oct 31, 2016Updated 9 years ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- A scalable framework for binary analysis in a containered environment.☆13May 20, 2019Updated 6 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- Pure Python parser for classic Windows Event Log files (.evt)☆52Jun 30, 2023Updated 2 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- The place to talk about our infrastructure or everything related to the Ultimate Hosts Blacklist project.☆12Oct 2, 2024Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- A modular Python application to collect intelligence for malicious hosts.☆274Apr 13, 2021Updated 4 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- CARET - A tool for viewing cyber analytic relationships☆57Jan 15, 2020Updated 6 years ago