fhightower / ioc-finder
Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security related information) from text. It uses grammars rather than regexes which makes it more readable, maintainable, and hackable. Explore our interactive documentation here: https://hightower.space/ioc-finder/
☆165Updated last year
Alternatives and similar repositories for ioc-finder:
Users that are interested in ioc-finder are comparing it to the libraries listed below
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆118Updated last year
- Definition, description and relationship types of MISP objects☆94Updated this week
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆348Updated 3 years ago
- A (nearly) production ready Dockered MISP☆231Updated last year
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆71Updated 8 months ago
- Sigma rules from Joe Security☆206Updated 3 months ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆98Updated last month
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆105Updated last year
- Tool to extract indicators of compromise from security reports in PDF format☆433Updated last year
- Tools to interact with APTnotes reporting/index.☆99Updated 4 years ago
- OSSEM Detection Model☆175Updated 2 years ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆146Updated 2 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- ☆169Updated 7 months ago
- Defanged Indicator of Compromise (IOC) Extractor.☆518Updated 5 months ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- A utility repo to assist with converting between MISP and STIX formats☆67Updated 4 years ago
- ☆116Updated last year
- ☆160Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A repository for commonly used STIX objects in order to avoid needless duplication. https://gi…☆90Updated this week
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆185Updated 3 years ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- Modules for expansion services, enrichment, import and export in MISP and other tools.☆353Updated last week
- Data from a BRAWL Automated Adversary Emulation Exercise☆203Updated 4 years ago
- Security ML models encoded as Yara rules☆213Updated last year
- Repository containing IOCs, CSV and MISP JSON from our blogs☆79Updated 3 years ago
- Python API Client for TheHive☆219Updated this week
- Log Entry to Sigma Rule Converter☆107Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago