ioc-fang / ioc-fanger
Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
☆61Updated last year
Alternatives and similar repositories for ioc-fanger:
Users that are interested in ioc-fanger are comparing it to the libraries listed below
- Converting data from services like Censys and Shodan to a common data model☆49Updated 7 months ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated 2 months ago
- Website crawler with YARA detection☆88Updated last year
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 3 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- ☆33Updated 3 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- ☆34Updated 4 years ago
- ☆24Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 3 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 2 years ago
- Specifications used in the MISP project including MISP core format☆51Updated 3 months ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- The FASTEST way to consume threat intel.☆68Updated last year
- Best practices in threat intelligence☆46Updated 2 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- Home to the ActorTrackr source code☆28Updated 7 years ago
- Python module to use the MISP Taxonomies☆29Updated last month
- A collection of typical false positive indicators☆55Updated 4 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 3 months ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- ☆18Updated 3 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago