rstcloud / rstthreatsLinks
Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
☆35Updated last year
Alternatives and similar repositories for rstthreats
Users that are interested in rstthreats are comparing it to the libraries listed below
Sorting:
- Fast IOC and YARA Scanner☆84Updated 5 years ago
- A collection of tips for using MISP.☆74Updated 10 months ago
- ☆119Updated 2 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆60Updated 4 months ago
- Wrap any binary into a cached webserver☆55Updated 3 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆92Updated last year
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆64Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- Repository for SPEED SIEM Use Case Framework☆56Updated 5 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 5 months ago
- Recon Hunt Queries☆78Updated 4 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆65Updated 2 years ago
- Searches for Insider Threat Hunting☆32Updated 6 years ago
- Resources for SANS CTI Summit 2021 presentation☆103Updated last year
- ReWrite of AChoir in Go for Cross Platform☆41Updated last week
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 3 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆63Updated 2 years ago
- Tool to read EVTX files including SYSMON and convert to JSON, MISP Objects and Graph stream☆12Updated 4 years ago
- A tool designed to hunt for Phishing Kit source code☆224Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- misp-cloud - Cloud-ready images of MISP☆74Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
- Python library for threat intelligence☆89Updated 9 months ago
- Corelight@Home script☆44Updated 2 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆90Updated 3 weeks ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆88Updated 2 years ago
- ☆36Updated 4 years ago