cudeso / OPML-Security-Feeds
A list of OPML Security Feeds
☆66Updated last year
Related projects ⓘ
Alternatives and complementary repositories for OPML-Security-Feeds
- automate your MISP installs☆66Updated 4 years ago
- ☆34Updated 3 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 2 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 3 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- misp-cloud - Cloud-ready images of MISP☆72Updated 2 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆92Updated 2 years ago
- Evolving directions on building the best Open Source Forensics VM☆159Updated 6 years ago
- Web application to create indexes for GIAC certification examinations.☆134Updated last year
- The FASTEST way to consume threat intel.☆64Updated last year
- Web app that provides basic navigation and annotation of ATT&CK matrices☆57Updated 5 years ago
- ☆53Updated 3 years ago
- Files vetted, and approved for public release☆53Updated 11 months ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆107Updated 4 years ago
- A curated list of awesome things related to TheHive & Cortex☆173Updated 3 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆100Updated 5 months ago
- An ELK environment containing interesting security datasets.☆133Updated 4 years ago
- A community event for security researchers to share their favorite notebooks☆106Updated 9 months ago
- Learn you a book for some infosec good☆62Updated 4 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- A collection of notebooks built for defensive and offensive operations.☆76Updated 4 years ago
- Tools for the Computer Incident Response Team☆142Updated 7 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆66Updated 7 years ago
- Dump of organized knowledge on DFIR☆132Updated 3 years ago
- Expert Investigation Guides☆50Updated 3 years ago
- For storing of the volumes☆3Updated 4 years ago
- ☆34Updated 3 years ago