huydhn / certstream-analytics
certstream + analytics
☆10Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for certstream-analytics
- ☆24Updated 2 years ago
- ☆14Updated 6 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆32Updated 9 months ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated 2 weeks ago
- Python 3 library to build YARA rules.☆13Updated 3 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Virustotal Data to Timesketch☆17Updated 5 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 2 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- Threat hunting with EQL and Bro. This repo contains modifications to EQL and EQLLib to use BRO logs.☆8Updated 5 years ago
- ☆22Updated 3 years ago
- Scripts to help hunt for possible golden/silver TGT tickets☆16Updated 7 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated 10 months ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆15Updated 3 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 7 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Updated this week
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Cybersecurity Incidents Mind Maps☆32Updated 3 years ago
- Generate bulk YARA rules from YAML input☆22Updated 4 years ago
- Historical Observations of Actionable Reputation Data☆13Updated 6 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 3 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆22Updated 9 months ago
- Proof-of-concept for phishing intelligence in Elastic☆15Updated 5 years ago