ninoseki / ioc-extractor
An npm package for extracting common IoC (Indicator of Compromise) from a block of text
☆57Updated 3 months ago
Alternatives and similar repositories for ioc-extractor:
Users that are interested in ioc-extractor are comparing it to the libraries listed below
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- URL fingerprinting made easy☆86Updated last year
- Converting data from services like Censys and Shodan to a common data model☆49Updated 7 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆30Updated 2 weeks ago
- ☆28Updated 3 months ago
- ☆24Updated 2 years ago
- ☆41Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Yara Based Detection Engine for web browsers☆47Updated 3 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆46Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 10 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- Automatic detection engineering technical state compliance☆55Updated 9 months ago
- Yet another way to find where to report an abuse☆32Updated 3 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago
- Website crawler with YARA detection☆88Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 3 months ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆25Updated 4 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- Collection of videos of Raids on Cybercriminals☆19Updated last month