ninoseki / iocingestor
An extendable tool to extract and aggregate IoCs from threat feeds
☆33Updated last year
Alternatives and similar repositories for iocingestor:
Users that are interested in iocingestor are comparing it to the libraries listed below
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- A list of IOCs applicable to PoshC2☆24Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- ☆24Updated 2 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 4 years ago
- ☆14Updated 6 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 5 years ago
- ☆41Updated 11 months ago
- Mass Triage Tools☆20Updated last month
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- repo for sharing stuff☆16Updated last year
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- OSSEM Modular☆27Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆56Updated last month
- Low budget VirusTotal Intelligence Cosplay☆20Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆13Updated 3 years ago
- Yara rules☆20Updated last year
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Updated 5 years ago
- Git for me to put all my forensics stuff☆21Updated last month
- Links to malware-related YARA rules☆14Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 6 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Updated 3 years ago