infobloxopen / threat-intelligence
☆74Updated 3 weeks ago
Alternatives and similar repositories for threat-intelligence:
Users that are interested in threat-intelligence are comparing it to the libraries listed below
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆103Updated 6 months ago
- A collection of tips for using MISP.☆74Updated 4 months ago
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 5 months ago
- Sample programs to access the API☆81Updated last month
- MISP to Sentinel integration☆64Updated 2 weeks ago
- A collection of various SIEM rules relating to malware family groups.☆66Updated 10 months ago
- ☆87Updated 2 months ago
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- ☆118Updated last year
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- Azure function to insert MISP data in to Azure Sentinel☆32Updated 2 years ago
- Fast IOC and YARA Scanner☆79Updated 5 years ago
- ☆72Updated 6 months ago
- ☆51Updated 11 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆87Updated 5 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆72Updated 5 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆37Updated last month
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆111Updated 5 months ago
- A preconfigured Velociraptor triage collector☆51Updated this week
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 2 months ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆52Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated last year
- Cleanup of older MISP events can require some work until now☆25Updated 2 years ago
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated this week
- User Feedback Space of #MitreAssistant☆37Updated last year
- ☆25Updated 3 weeks ago
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆86Updated 8 months ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆61Updated 11 months ago
- ☆34Updated 4 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month