csirtgadgets / verbose-robot
The Fastest way to consume Threat Intel
☆25Updated 2 years ago
Alternatives and similar repositories for verbose-robot:
Users that are interested in verbose-robot are comparing it to the libraries listed below
- Use DNS to hunt for threats including DGAs☆14Updated 9 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- ☆24Updated 2 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Home to the ActorTrackr source code☆28Updated 7 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆39Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- ☆29Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Historical Observations of Actionable Reputation Data☆13Updated 6 years ago
- ☆33Updated 3 years ago
- For storing of the volumes☆4Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- ☆27Updated 7 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Updated 4 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago
- Triage automation for suspect URLs☆12Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Reference sheet for Threat Hunting Professional Course☆25Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Updated 3 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆27Updated 6 years ago
- Website crawler with YARA detection☆88Updated last year
- Build your own threat hunting maturity model☆11Updated 7 years ago