jaegeral / security-apisLinks
A collective list of public APIs for use in security. Contributions welcome
☆968Updated 6 months ago
Alternatives and similar repositories for security-apis
Users that are interested in security-apis are comparing it to the libraries listed below
Sorting:
- A collection of sources of indicators of compromise.☆947Updated 9 months ago
- A collection of resources for Threat Hunters☆914Updated last year
- Extract and aggregate threat intelligence.☆902Updated 2 years ago
- A query aggregator for OSINT based threat hunting☆930Updated 3 weeks ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆594Updated 2 years ago
- Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.☆592Updated 2 months ago
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆613Updated 6 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Updated last year
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,106Updated 2 months ago
- Your Everyday Threat Intelligence☆1,949Updated this week
- Create actionable data from your Vulnerability Scans☆1,396Updated 3 years ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,456Updated last year
- CLI tool for open source and threat intelligence☆1,255Updated 11 months ago
- AIL framework - Analysis Information Leak framework☆878Updated last week
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆934Updated last year
- An information security preparedness tool to do adversarial simulation.☆1,142Updated 6 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,176Updated 2 years ago
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆573Updated 2 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,349Updated last year
- SIEM Tactics, Techiques, and Procedures☆694Updated last week
- An informational repo about hunting for adversaries in your IT environment.☆1,846Updated 4 years ago
- Incident Response Methodologies☆1,027Updated 7 years ago
- DFIRTrack - The Incident Response Tracking Application☆532Updated 3 weeks ago
- Online hash checker for Virustotal and other services☆845Updated 10 months ago
- The Open-Source AWS Cyber Range☆491Updated 5 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Updated 3 weeks ago
- Cyber Analytics Repository☆978Updated 8 months ago
- Actionable analytics designed to combat threats☆1,006Updated 3 years ago
- Simple Bash IOC Scanner☆773Updated 4 years ago
- A knowledge base of actionable Incident Response techniques☆662Updated 3 years ago