All-in-one bundle of MISP, TheHive and Cortex
☆170Sep 27, 2022Updated 3 years ago
Alternatives and similar repositories for mthc
Users that are interested in mthc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of awesome things related to TheHive & Cortex☆185Oct 9, 2021Updated 4 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- ☆19Oct 23, 2020Updated 5 years ago
- An ELK environment containing interesting security datasets.☆136May 11, 2020Updated 5 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,341Dec 13, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Extract and aggregate threat intelligence.☆907Jan 31, 2024Updated 2 years ago
- DFIRTrack - The Incident Response Tracking Application☆534Jan 13, 2026Updated 2 months ago
- ☆14May 30, 2018Updated 7 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,175Jul 26, 2023Updated 2 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,366Updated this week
- A query aggregator for OSINT based threat hunting☆932Mar 7, 2026Updated 2 weeks ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆104Dec 29, 2023Updated 2 years ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- A (nearly) production ready Dockered MISP☆230Jan 12, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Re-play Security Events☆1,729Mar 20, 2024Updated 2 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆556May 9, 2023Updated 2 years ago
- MISP Docker (XME edition)☆282Dec 5, 2023Updated 2 years ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,467Sep 25, 2024Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated last year
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,508Jan 12, 2026Updated 2 months ago
- Digital Forensics Investigation Platform☆876Oct 12, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated last year
- ☆34May 4, 2020Updated 5 years ago
- Configuration files for the SOF-ELK VM☆1,724Jan 21, 2026Updated 2 months ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- Misc Threat Hunting Resources☆377Jan 26, 2023Updated 3 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- Integrate Zeek with Alienvault OTX☆25Sep 11, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Defanged Indicator of Compromise (IOC) Extractor.☆571Aug 28, 2024Updated last year
- Windows Events Attack Samples☆2,531Jan 24, 2023Updated 3 years ago
- Your Everyday Threat Intelligence☆1,962Updated this week
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 7 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,116Feb 14, 2026Updated last month
- Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.☆182Jun 23, 2024Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,269Jan 21, 2026Updated 2 months ago