stratosphereips / ip_enrich
Enrich IP addresses with metadata and threat intelligence indicators.
☆21Updated last year
Related projects: ⓘ
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆82Updated this week
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆157Updated 10 months ago
- Website for ail-typo-squatting library☆48Updated 3 months ago
- ☆25Updated 3 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆38Updated 5 months ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆30Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆90Updated this week
- Adversary Emulation Planner☆37Updated 2 months ago
- The FASTEST way to consume threat intel.☆62Updated last year
- An open source platform to support analysts to organise their case and tasks☆49Updated 2 weeks ago
- Notes for High Availability MISP in AWS☆18Updated 4 years ago
- OpenCTI Docker deployment helpers☆153Updated this week
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)☆158Updated last year
- Template for building a packet sniffer☆15Updated 5 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆47Updated this week
- OASIS TC Open Repository: TAXII 2 Server Library Written in Python☆119Updated 5 months ago
- Web Application for domain name monitoring / alerting☆61Updated last month
- Algorithme d'apprentissage statistique permettant de créer un modèle sur les lignes de commandes des évènements "Création de Processus", …☆78Updated 7 months ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆86Updated 2 years ago
- AssemblyLine4 documentation☆28Updated last week
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆38Updated 4 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆139Updated 2 weeks ago
- The Security Analyst’s Guide to Suricata☆49Updated 3 months ago
- Structured Threat Intelligence Graph☆83Updated last week
- Convert Sigma rules to Wazuh rules☆55Updated 5 months ago
- STIX2 graph visualisation library in JS☆72Updated 3 weeks ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆51Updated last week
- Summarize CTI reports with OpenAI☆13Updated this week
- Threat Detection & Anomaly Detection rules for popular open-source components☆49Updated 2 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆33Updated last month