infobloxopen / threat-intelligenceLinks
☆105Updated last month
Alternatives and similar repositories for threat-intelligence
Users that are interested in threat-intelligence are comparing it to the libraries listed below
Sorting:
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆110Updated this week
- Indicators of Compromise☆253Updated last week
- ☆105Updated 7 months ago
- Sample programs to access the API☆103Updated 2 months ago
- Fast IOC and YARA Scanner☆89Updated 5 years ago
- ☆102Updated 2 months ago
- A tool that allows you to document and assess any security automation in your SOC☆49Updated last year
- MISP to Sentinel integration☆79Updated 2 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Updated 3 weeks ago
- Azure function to insert MISP data in to Azure Sentinel☆34Updated 3 years ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- MISP Playbooks☆222Updated 3 months ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- Conference presentations☆60Updated 3 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Updated last year
- Anvilogic Forge☆114Updated 4 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆156Updated 2 months ago
- A collection of tips for using MISP.☆75Updated last year
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations☆103Updated 5 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆56Updated 3 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆50Updated 8 months ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Updated 2 weeks ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Updated this week
- Standard-Format Threat Intelligence Feeds☆127Updated last week
- ☆88Updated 11 months ago
- A repository of my own Sigma detection rules.☆163Updated 2 months ago
- Collection of useful Canary tools☆93Updated last week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year