csirtgadgets / csirtg-smrt-v1View external linksLinks
the fastest way to consume threat intelligence.
☆31Mar 9, 2023Updated 2 years ago
Alternatives and similar repositories for csirtg-smrt-v1
Users that are interested in csirtg-smrt-v1 are comparing it to the libraries listed below
Sorting:
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 10 years ago
- The FASTEST way to parse Email☆17Dec 24, 2021Updated 4 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆184Apr 20, 2023Updated 2 years ago
- Structured Threat Intelligence Graph☆99Dec 30, 2025Updated last month
- ☆24Sep 28, 2022Updated 3 years ago
- You're busted!☆27Dec 16, 2019Updated 6 years ago
- This is a python version of samesame repo to generate homograph strings☆23Aug 22, 2018Updated 7 years ago
- Seamless Threat Intelligence Platform☆47Jan 29, 2024Updated 2 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- ☆15Sep 24, 2024Updated last year
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Threat Intelligence APIs☆282Aug 14, 2023Updated 2 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 4 months ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Apr 6, 2020Updated 5 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- ☆30Mar 3, 2021Updated 4 years ago