honeynet / ochiLinks
☆32Updated 5 months ago
Alternatives and similar repositories for ochi
Users that are interested in ochi are comparing it to the libraries listed below
Sorting:
- Threat Intel Platform for T-POTs☆161Updated this week
- BuffaLogs is an Open Source Django App whose main purpose is to detect login anomalies☆49Updated this week
- OWASP BLT is a collection of security tools.☆196Updated this week
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆55Updated this week
- the IoT and OT (Operational Technology) Honeypot☆25Updated last year
- Swagger/ OpenAPI specifications for security products and services☆78Updated last month
- DFIQ is a collection of investigative questions and the approaches for answering them☆292Updated 8 months ago
- An open source platform to support analysts to organise their case and tasks☆107Updated this week
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆61Updated 2 months ago
- Helm charts for running open source digital forensic tools in Kubernetes☆117Updated this week
- Sublime rules for email attack detection, prevention, and threat hunting.☆327Updated this week
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆229Updated 2 weeks ago
- ☆53Updated last year
- This is a repository of vendor-agnostic workflows provided for those interested in deploying Security Orchestration, Automation, and Resp…☆88Updated 4 years ago
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.☆68Updated 5 months ago
- Documentation used for Shuffle☆20Updated this week
- A system that creates a bogus web structure to entrap and delay web scanners☆61Updated 4 years ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆57Updated 2 months ago
- A collection of tips for using MISP.☆74Updated 9 months ago
- Recon Hunt Queries☆78Updated 4 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated 10 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated last week
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆82Updated 3 weeks ago
- Picatrix is a library designed to help security analysts in a notebook environment, such as colab or jupyter.☆50Updated 6 months ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆90Updated this week
- Cisco Orbital - Osquery queries by Talos☆135Updated last year
- ☆35Updated 3 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 3 months ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆232Updated 5 months ago