fhightower / ioc-finderLinks
Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security related information) from text. It uses grammars rather than regexes which makes it more readable, maintainable, and hackable. Explore our interactive documentation here: https://hightower.space/ioc-finder/
☆167Updated last year
Alternatives and similar repositories for ioc-finder
Users that are interested in ioc-finder are comparing it to the libraries listed below
Sorting:
- OASIS TC Open Repository: TAXII 2 Client Library Written in Python☆116Updated last year
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆124Updated last year
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆151Updated 3 months ago
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆130Updated last year
- Definition, description and relationship types of MISP objects☆99Updated this week
- Swagger/ OpenAPI specifications for security products and services☆78Updated last month
- A (nearly) production ready Dockered MISP☆232Updated last year
- Sigma rules from Joe Security☆217Updated 8 months ago
- Defanged Indicator of Compromise (IOC) Extractor.☆539Updated 10 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆93Updated last month
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆352Updated 3 years ago
- OpenCTI Python Client☆140Updated last week
- Graphics, icons, and diagrams to support STIX 2☆47Updated 4 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated 2 weeks ago
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆125Updated last week
- Sigma Detection Rule Repository☆89Updated 5 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Updated 7 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆152Updated 4 months ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆105Updated last year
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated last year
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆188Updated 4 years ago
- Log Entry to Sigma Rule Converter☆108Updated 3 years ago
- A curated list of awesome things related to TheHive & Cortex☆183Updated 3 years ago
- Modules for expansion services, enrichment, import and export in MISP and other tools.☆354Updated last month
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆89Updated last month
- 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆263Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- MISP Docker (XME edition)☆282Updated last year