gnxsecurity / gnx-threat-intelligenceLinks
A commercial grade threat intelligence feed thats validated and updated every half hour.
☆19Updated 2 years ago
Alternatives and similar repositories for gnx-threat-intelligence
Users that are interested in gnx-threat-intelligence are comparing it to the libraries listed below
Sorting:
- ☆33Updated this week
- Proof-of-concept for phishing intelligence in Elastic☆15Updated 6 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆38Updated 3 years ago
- Cyber Threat Intelligence Feeds☆69Updated last year
- Website crawler with YARA detection☆90Updated 2 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Updated 5 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆42Updated 7 years ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- Yet another way to find where to report an abuse☆30Updated 10 months ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆69Updated last month
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 5 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆34Updated last year
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆75Updated this week
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Updated 5 months ago
- repo for sharing stuff☆17Updated 5 months ago
- Incident Response Network Tools☆24Updated 4 years ago
- Best practices in threat intelligence☆49Updated 3 years ago
- Visualize networks of phishing by querying the phishstats.info API☆79Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- ☆28Updated 5 months ago
- Triage automation for suspect URLs☆13Updated 6 years ago
- THOR MITRE ATT&CK Framework Coverage☆25Updated 5 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 9 years ago
- Converting data from services like Censys and Shodan to a common data model☆51Updated 5 months ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- Suricata rule and intel index☆33Updated last month
- Tool used to perform threat intelligence against packet data☆36Updated 10 months ago