jalewis / actortrackrLinks
Home to the ActorTrackr source code
☆29Updated 7 years ago
Alternatives and similar repositories for actortrackr
Users that are interested in actortrackr are comparing it to the libraries listed below
Sorting:
- ☆24Updated 2 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆22Updated 6 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Python module to use the MISP Taxonomies☆29Updated this week
- Cyber Intel Management☆48Updated 7 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 8 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆57Updated this week
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Updated 8 years ago
- Providing timelines based on OSINT Reports☆32Updated last year
- For storing of the volumes☆4Updated 5 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Updated 7 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Yara rules to be used with the Burp Yara-Scanner extension☆48Updated 3 years ago
- automate your MISP installs☆68Updated 4 years ago