stratosphereips / AIP
The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.
☆30Updated 5 months ago
Alternatives and similar repositories for AIP:
Users that are interested in AIP are comparing it to the libraries listed below
- ☆28Updated this week
- MISP website (hugo-based)☆24Updated 3 weeks ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆72Updated 10 months ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆35Updated 10 months ago
- Network Entity Reputation Database☆34Updated 2 months ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆40Updated 6 years ago
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.☆68Updated last month
- ☆13Updated 3 years ago
- Snorpy is a python script the gives a Gui interface to help those new to snort create rules.☆62Updated 8 months ago
- ☆29Updated 7 years ago
- Yet another way to find where to report an abuse☆32Updated 3 months ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated last month
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆55Updated 10 months ago
- ☆35Updated 4 years ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Updated 3 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 8 months ago
- Scripts to deploy and update MISP in air-gapped environments☆17Updated 2 months ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆18Updated 7 years ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 7 months ago
- A tool to automatically decode and translate any TCP hexa payload data form any language to english.☆17Updated 3 years ago
- The FASTEST way to consume threat intel.☆68Updated last year
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆100Updated 3 months ago
- Definition, description and relationship types of MISP objects☆97Updated 3 weeks ago
- Website crawler with YARA detection☆88Updated last year
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆110Updated last year
- the IoT and OT (Operational Technology) Honeypot☆23Updated last year
- ☆53Updated last week
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year