cocaman / urlhausLinks
☆29Updated 7 years ago
Alternatives and similar repositories for urlhaus
Users that are interested in urlhaus are comparing it to the libraries listed below
Sorting:
- Converting data from services like Censys and Shodan to a common data model☆49Updated 9 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- THOR MITRE ATT&CK Framework Coverage☆24Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Simple yara rule manager☆66Updated 2 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Incident Response Network Tools☆24Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- A DFVFS Backed Forensic Viewer☆40Updated 5 years ago
- Mass Triage Tools☆20Updated 4 months ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆21Updated 6 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- ☆16Updated 4 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- Volatility plugins developed and maintained by the community☆21Updated 9 months ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆48Updated last year
- The Fastest way to consume Threat Intel