Cyber Threat Intelligence - Toolbox
☆52Oct 8, 2018Updated 7 years ago
Alternatives and similar repositories for CTI-Toolbox
Users that are interested in CTI-Toolbox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- Cyber Threat Intelligence Feeds☆98Sep 26, 2016Updated 9 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- open-source intelligence gathering for SIEMs <3☆38Feb 16, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆145Nov 26, 2018Updated 7 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 9 months ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆109Jan 20, 2026Updated 2 months ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- Dockerized Cuckoo build☆10Aug 3, 2016Updated 9 years ago
- Maltego transform for visualizing Nessus scan data☆45Dec 11, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- A repository to host emojis used in the Digital Forensics Discord Server☆18May 28, 2022Updated 3 years ago
- OPNids GUI, API and systems backend☆34Apr 14, 2019Updated 6 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Sep 29, 2021Updated 4 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆150Jun 3, 2014Updated 11 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆129Aug 28, 2015Updated 10 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- A SIEM inspired by HECTOR, built on Django.☆27Apr 16, 2019Updated 6 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Cyber Threat Intelligence Feeds☆71May 3, 2024Updated last year
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 3 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- A package manager for Zeek☆47Mar 5, 2026Updated 3 weeks ago
- Gather and compile open source threat intelligence feeds.☆40Feb 19, 2022Updated 4 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- Playbooks designed for IBM SOAR developed by The IR Gurus. These playbooks can be used to demonstrate how to design playbooks, perform au…☆18May 1, 2024Updated last year
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- ☆18Dec 16, 2023Updated 2 years ago
- Just random powershell things I've put together.☆37May 7, 2025Updated 10 months ago
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago