A list of OPML Security Feeds
☆79Mar 31, 2025Updated last year
Alternatives and similar repositories for OPML-Security-Feeds
Users that are interested in OPML-Security-Feeds are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 8 months ago
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Apr 21, 2026Updated 2 weeks ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Installation automatique de Nagios depuis les sources☆22Feb 28, 2014Updated 12 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆28Apr 10, 2024Updated 2 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 11 years ago
- a authentication log plugin for YOURLS☆18Jan 6, 2018Updated 8 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Rulezet is an open-source web platform for sharing, evaluating, improving, and managing cybersecurity detection rules (YARA, Sigma, Suric…☆48Updated this week
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated 2 years ago
- Automated memory forensics analysis☆32Aug 20, 2019Updated 6 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 10 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- A Python implementation of our efficient Bloom filter library.☆29Feb 27, 2020Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆18Dec 20, 2024Updated last year
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- Palo Alto Stuff☆16Feb 16, 2016Updated 10 years ago
- AIL project training materials☆39Apr 21, 2026Updated 2 weeks ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Cli interface to threatcrowd.org☆21Jul 6, 2017Updated 8 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Common Exercise Format - CEXF☆11Aug 15, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- IMEI generator used in Huawei modified firmware☆13May 16, 2022Updated 3 years ago
- ☆27Aug 15, 2022Updated 3 years ago
- ☆14May 30, 2018Updated 7 years ago
- Python client and module for Vulnerability-Lookup.☆16Apr 28, 2026Updated last week
- Yara intergrated into BurpSuite☆48Jun 30, 2016Updated 9 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- RSS to email script☆11Jul 27, 2012Updated 13 years ago