Threat Intelligence distribution
☆31Dec 30, 2015Updated 10 years ago
Alternatives and similar repositories for nyx
Users that are interested in nyx are comparing it to the libraries listed below
Sorting:
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- A Bro package to identify connections that are bursting (lots of data and transferring quickly).☆13Oct 15, 2020Updated 5 years ago
- Threat Intelligence APIs☆280Aug 14, 2023Updated 2 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- Python based client for IBM XForce Exchange☆26Aug 5, 2016Updated 9 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- pan-stix☆19Oct 12, 2017Updated 8 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- python SDK for CIFv2☆13Nov 5, 2019Updated 6 years ago
- Python interface to the CRITs API☆22Mar 10, 2017Updated 8 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- CrowdStrike Threat Intelligence☆35Jan 14, 2023Updated 3 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 8 months ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Aug 13, 2021Updated 4 years ago
- ☆19Jul 24, 2021Updated 4 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Snort in a Docker Container☆31Mar 21, 2014Updated 11 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Integrate Zeek with Alienvault OTX☆25Sep 11, 2020Updated 5 years ago
- Enrich a host with open source security information☆27Oct 4, 2015Updated 10 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago