the fastest way to consume threat intelligence.
☆30Mar 9, 2023Updated 3 years ago
Alternatives and similar repositories for csirtg-smrt-v1
Users that are interested in csirtg-smrt-v1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- The FASTEST way to parse Email☆18Dec 24, 2021Updated 4 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Bro integration with osquery☆15Mar 24, 2023Updated 3 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Carve Windows Prefetch files from arbitrary binary data☆16Jun 11, 2017Updated 8 years ago
- Carbon Black Feeds☆73Apr 4, 2023Updated 2 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Parse a report and import the events into MISP☆30Oct 19, 2015Updated 10 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Mitre chopshop network decoder framework☆31Oct 13, 2025Updated 5 months ago
- Seamless Threat Intelligence Platform☆47Jan 29, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Threat Feed Aggregation, Made Easy☆169Jul 13, 2020Updated 5 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆57Nov 25, 2020Updated 5 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Credential Phish Analysis and Automation☆99Aug 22, 2018Updated 7 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- You're busted!☆28Dec 16, 2019Updated 6 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- Threat Intelligence APIs☆281Aug 14, 2023Updated 2 years ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 10 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Structured Threat Intelligence Graph☆99Dec 30, 2025Updated 3 months ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- ☆18Jun 8, 2018Updated 7 years ago