fhightower / ioc-finderLinks
Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security related information) from text. It uses grammars rather than regexes which makes it more readable, maintainable, and hackable. Explore our interactive documentation here: https://hightower.space/ioc-finder/
☆166Updated last year
Alternatives and similar repositories for ioc-finder
Users that are interested in ioc-finder are comparing it to the libraries listed below
Sorting:
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆123Updated last year
- Definition, description and relationship types of MISP objects☆99Updated 3 weeks ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆352Updated 3 years ago
- A (nearly) production ready Dockered MISP☆232Updated last year
- Tools to interact with APTnotes reporting/index.☆103Updated 4 years ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆151Updated 3 months ago
- Sigma rules from Joe Security☆216Updated 7 months ago
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated last year
- OpenCTI Python Client☆137Updated this week
- Sigma Detection Rule Repository☆88Updated 5 years ago
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆129Updated last year
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆152Updated last month
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆188Updated 4 years ago
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- ☆173Updated 11 months ago
- Defanged Indicator of Compromise (IOC) Extractor.☆535Updated 9 months ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- MISP Docker (XME edition)☆282Updated last year
- Modules for expansion services, enrichment, import and export in MISP and other tools.☆354Updated 2 weeks ago
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆115Updated last year
- Taxonomies used in MISP taxonomy system and can be used by other information sharing tool.☆278Updated 3 weeks ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated 2 weeks ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆93Updated 2 weeks ago
- Tool to extract indicators of compromise from security reports in PDF format☆436Updated 2 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated last week
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆63Updated last year
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- Seamless Threat Intelligence Platform☆48Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les r ègles YARA☆104Updated last month