stratosphereips / AIPLinks
The Attacker IP Prioritizer(AIP) dynamically generates resource-friendly IPv4 blocklists from Zeek network flows.
☆32Updated last year
Alternatives and similar repositories for AIP
Users that are interested in AIP are comparing it to the libraries listed below
Sorting:
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS☆162Updated last year
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.☆68Updated 7 months ago
- Threat Intel Platform for T-POTs☆157Updated this week
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆70Updated 7 months ago
- DynamiteNSM is a free Network Security Monitor developed by Dynamite Analytics to enable network visibility and advanced cyber threat det…☆171Updated 2 years ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Updated 3 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆102Updated 3 years ago
- A phishing kit collector for scavengers☆220Updated last week
- CSI SIEM☆110Updated 2 years ago
- The FASTEST way to consume threat intel.☆69Updated 2 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆75Updated 2 months ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Updated 2 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆82Updated 3 months ago
- RPM packages for MISP☆37Updated last week
- Cyber Threat Intelligence Feeds☆96Updated 9 years ago
- Sample programs to access the API☆95Updated 7 months ago
- A commercial grade threat intelligence feed thats validated and updated every half hour.☆19Updated 2 years ago
- A live dashboard for a real-time overview of threat intelligence from MISP instances☆204Updated 2 years ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆56Updated 2 weeks ago
- OASIS TC Open Repository: Validator for STIX 2.0 JSON normative requirements and best practices☆59Updated 4 months ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Updated 2 weeks ago
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- Cyber Threat Intelligence - Toolbox☆51Updated 7 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆102Updated last week
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- Zeek-Formatted Threat Intelligence Feeds☆381Updated this week
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated last month
- Tools to interact with APTnotes reporting/index.☆106Updated 5 years ago
- Definition, description and relationship types of MISP objects☆103Updated last week
- ☆52Updated 2 weeks ago