soprasteria / cybersecurity-dfmLinks
Data Feed Manager (news watch orchestrator to predict topic with deepdetect and store cleaned text in elasticsearch)
☆40Updated 2 years ago
Alternatives and similar repositories for cybersecurity-dfm
Users that are interested in cybersecurity-dfm are comparing it to the libraries listed below
Sorting:
- ☆30Updated 7 years ago
- For storing of the volumes☆4Updated 5 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Python API for generating Maltego mtgx files.☆18Updated 8 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆63Updated last year
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Updated 2 years ago
- Website crawler with YARA detection☆88Updated last year
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Cyber-investigation Analysis Standard Expression (CASE) Ontology☆71Updated 2 months ago
- External twitter feeder for AIL framework☆16Updated 2 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 5 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆60Updated 2 months ago
- Converting data from services like Censys and Shodan to a common data model☆50Updated last month
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Updated 3 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated last year
- ☆25Updated 2 years ago
- Allows querying Google Maps API for 2 specific places in precise distance from each other within given radius. Useful for geolocating fro…☆52Updated 5 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Tools used by CSIRT and especially in the scope of CNW☆16Updated last month
- A Zeek package that detects Zoom logins and meeting joins☆12Updated 5 years ago
- ☆9Updated 6 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- List of Sanctions and Most wanted☆28Updated 8 years ago
- Extract indicators of compromise from text, including "escaped" ones.☆160Updated 5 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated last month
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- This script accept a text file and collect any IP address (based on its format x.x.x.x) and check if it is one of Tor exit nodes☆9Updated 5 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago