intelowlproject / GreedyBearLinks
Threat Intel Platform for T-POTs
☆153Updated this week
Alternatives and similar repositories for GreedyBear
Users that are interested in GreedyBear are comparing it to the libraries listed below
Sorting:
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- MISP Playbooks☆203Updated 2 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- BlackBerry Threat Research & Intelligence☆98Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Collection of Jupyter Notebooks by @fr0gger_☆171Updated last week
- Docker image for Velocidex Velociraptor☆128Updated 3 months ago
- A curated list of awesome things related to TheHive & Cortex☆180Updated 3 years ago
- Rules generated from our investigations.☆195Updated last week
- A repository of my own Sigma detection rules.☆160Updated 9 months ago
- ☆204Updated 3 weeks ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆256Updated 3 months ago
- Repository of public reference frameworks for the DFIR community.☆116Updated last year
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.☆155Updated 4 months ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated last week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆90Updated last year
- Import CrowdStrike Threat Intelligence into your instance of MISP☆47Updated 2 weeks ago
- Resources To Learn And Understand SIGMA Rules☆177Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆142Updated last year
- An opensource sigma conversion tool built using pysigma☆130Updated 2 weeks ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆78Updated 2 weeks ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆151Updated 3 months ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆216Updated 2 weeks ago
- ☆92Updated last month
- Cyber Threat Intelligence Data, Indicators, and Analysis☆90Updated last week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 11 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆203Updated 2 years ago