stricaud / sightingdb
SightingDB is a database for Sightings
☆22Updated last year
Alternatives and similar repositories for sightingdb:
Users that are interested in sightingdb are comparing it to the libraries listed below
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- pocket guide for core threat hunting concepts☆23Updated 4 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Tools to search through massive amounts of data☆21Updated 3 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated 3 weeks ago
- Scripts for accessing and transforming cyber threat intelligence☆25Updated 9 years ago
- FRAC and RIFT☆17Updated 5 years ago
- A YARA Rule Performance Measurement Tool☆58Updated 11 months ago
- Site for IWS book content☆18Updated 6 years ago
- Paper and Links to Crimeware in the Modern Era☆31Updated 5 years ago
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- Zeek package to generate a SMB client fingerprint☆27Updated 4 years ago
- ☆17Updated 7 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- ☆13Updated 2 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆20Updated 6 years ago
- ☆33Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- ☆12Updated 5 years ago
- Powershell Functions to interact with TheHive-Project☆10Updated 5 years ago
- ☆14Updated 6 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 5 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Updated 3 years ago
- ☆15Updated 4 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago