csirtgadgets / csirtg-mail-py
The FASTEST way to parse Email
☆17Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for csirtg-mail-py
- ☆14Updated 4 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated 11 months ago
- List of Awesome Vertex Synapse Resources☆27Updated 3 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆56Updated last year
- the fastest way to consume threat intelligence.☆29Updated last year
- Expert Investigation Guides☆50Updated 3 years ago
- ☆34Updated 3 years ago
- A collection of typical false positive indicators☆54Updated 3 years ago
- IntelMQ command line tool to process events and send out email notifications.☆9Updated 2 months ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- A collection of notebooks built for defensive and offensive operations.☆76Updated 4 years ago
- Converting data from services like Censys and Shodan to a common data model☆48Updated 2 months ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆43Updated 3 years ago
- Volatility plugins developed and maintained by the community☆21Updated 2 months ago
- Exports MISP events to STIX and ingest into McAfee ESM☆15Updated 4 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- Create a MS Word index file from PowerPoint notes and slides☆42Updated 4 years ago
- A set of templates for documenting threat intelligence☆73Updated 11 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- ☆29Updated 3 years ago
- ☆27Updated 6 years ago
- Scripts for accessing and transforming cyber threat intelligence☆25Updated 9 years ago