csirtgadgets / csirtg-smrt-v1
the fastest way to consume threat intelligence.
☆27Updated last year
Related projects: ⓘ
- ☆40Updated this week
- IntelMQ command line tool to process events and send out email notifications.☆9Updated this week
- ☆19Updated this week
- Cyber Intel Management☆46Updated 6 years ago
- ☆57Updated this week
- Python unbup script for McAfee .bup files (with some additional fun features). This script is fully implemented in python it's not just a…☆36Updated 6 years ago
- Python IOC Editor☆61Updated 9 years ago
- CRITs IOC Visualization in Maltego☆27Updated 9 years ago
- Threat Intelligence distribution☆30Updated 8 years ago
- ☆17Updated 6 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆43Updated 3 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 2 years ago
- ☆38Updated 6 years ago
- A set of templates for documenting threat intelligence☆72Updated 11 years ago
- An informational repo about hunting for adversaries in your IT environment.☆13Updated 7 years ago
- Python script to pull various IOCs from PDFs☆15Updated 9 years ago
- InvestigationPlaybookSpec☆72Updated 6 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Updated 5 years ago
- This is a script module for Bro that encapsulates and detects activity related to the Mandiant APT1 report.☆47Updated 10 years ago
- ☆20Updated this week
- integrating bro into yara☆32Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆28Updated 8 years ago
- Log Examination Tool☆26Updated 7 years ago
- Parse a report and import the events into MISP☆28Updated 8 years ago
- Python interface to the CRITs API☆22Updated 7 years ago
- ☆59Updated this week
- Top DNS Measurement for Bro☆11Updated 4 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Updated 8 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆29Updated this week