stucco / dataLinks
Collection of data sources that can be used to provide context to security events
☆25Updated 10 years ago
Alternatives and similar repositories for data
Users that are interested in data are comparing it to the libraries listed below
Sorting:
- CybOX Schemas and Schema Development☆43Updated 8 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Cyber Intel Management☆49Updated 7 years ago
- ☆37Updated 11 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆82Updated 9 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Maltego Transform to put entities into MISP events☆28Updated 4 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 9 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- Home to the ActorTrackr source code☆29Updated 8 years ago
- Gather and compile open source threat intelligence feeds.☆40Updated 3 years ago
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆68Updated 10 years ago
- Cyber Threat Intelligence Feeds☆68Updated last year
- stoQ Public Plugins☆71Updated 2 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆148Updated 11 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆35Updated 9 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- STIX Visualization Tool☆109Updated 7 years ago
- A framework for receiving and redistributing abuse feeds☆124Updated 5 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆41Updated 13 years ago
- ☆28Updated 8 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago