csirtgadgets / csirtg-mail-py
The FASTEST way to parse Email
☆17Updated 3 years ago
Alternatives and similar repositories for csirtg-mail-py:
Users that are interested in csirtg-mail-py are comparing it to the libraries listed below
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- ☆16Updated 4 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- A homebrewed cyber threat intelligence solution☆20Updated 12 years ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Volatility plugins developed and maintained by the community☆21Updated 7 months ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Updated 4 years ago
- Hunting IOCs all day every day...☆86Updated last year
- the fastest way to consume threat intelligence.☆29Updated 2 years ago
- ☆29Updated 4 years ago
- Exports MISP events to STIX and ingest into McAfee ESM☆15Updated 5 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 3 months ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 7 months ago
- IntelMQ command line tool to process events and send out email notifications.☆9Updated last month
- Best practices in threat intelligence☆46Updated 2 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Tools to search through massive amounts of data☆21Updated 5 months ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- automate your MISP installs☆67Updated 4 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated last year
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago