kdrypr / CTI-Feed-CollectorLinks
Open Source Cyber Threat Intelligence Feed Collector
☆17Updated 4 years ago
Alternatives and similar repositories for CTI-Feed-Collector
Users that are interested in CTI-Feed-Collector are comparing it to the libraries listed below
Sorting:
- A ransomware group monitoring bot written in C#.☆57Updated 3 years ago
- A repo for security analytics & threat hunting resources☆22Updated 7 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Updated 3 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆23Updated 3 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Updated 3 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 3 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Updated 4 years ago
- Carbon Black Response IR tool☆55Updated 5 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- Library of threat hunts to get any user started!☆46Updated 5 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- IOC Collection 2022☆57Updated 2 years ago
- Python API for interacting with sigma rules.☆55Updated 3 years ago
- ☆29Updated 11 months ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Updated 3 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Hunt malware with Volatility☆47Updated 5 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Windows Security Logging☆43Updated 3 years ago
- Transform EQL detection rules to VQL artifacts☆12Updated 4 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated 2 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Updated 2 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆42Updated 2 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Updated 10 months ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated 2 years ago