the fastest way to consume threat intelligence.
☆30Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for csirtg-smrt-v1
Users that are interested in csirtg-smrt-v1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- The FASTEST way to parse Email☆18Dec 24, 2021Updated 4 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Bro integration with osquery☆15Mar 24, 2023Updated 3 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago
- Carbon Black Feeds☆73Apr 4, 2023Updated 3 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Parse a report and import the events into MISP☆30Oct 19, 2015Updated 10 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Mitre chopshop network decoder framework☆31Oct 13, 2025Updated 6 months ago
- Seamless Threat Intelligence Platform☆47Jan 29, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Threat Feed Aggregation, Made Easy☆169Jul 13, 2020Updated 5 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆57Nov 25, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Credential Phish Analysis and Automation☆99Aug 22, 2018Updated 7 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 9 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- You're busted!☆28Dec 16, 2019Updated 6 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Threat Intelligence APIs☆282Apr 2, 2026Updated 2 weeks ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Structured Threat Intelligence Graph☆99Dec 30, 2025Updated 3 months ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago