stucco / dataLinks
Collection of data sources that can be used to provide context to security events
☆25Updated 9 years ago
Alternatives and similar repositories for data
Users that are interested in data are comparing it to the libraries listed below
Sorting:
- CybOX Schemas and Schema Development☆43Updated 8 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆34Updated 9 years ago
- Maltego Transform to put entities into MISP events☆27Updated 3 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Passive DNS Common Output Format☆36Updated 9 months ago
- Gather and compile open source threat intelligence feeds.☆40Updated 3 years ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago
- ☆18Updated 7 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- For storing of the volumes☆4Updated 5 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- A tool to extract structured cyber information from incident reports.☆80Updated 6 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆68Updated 10 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 9 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Hunting IOCs all day every day...☆86Updated last year
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- Maltego transforms for the ThreatCrowd search API☆49Updated 7 years ago
- ☆27Updated 7 years ago
- ☆37Updated 11 years ago