Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect intelligence from custom or public sources. Automatically updates feeds and tries to further enhance data for dashboards.
☆151Jun 3, 2014Updated 11 years ago
Alternatives and similar repositories for Threatelligence
Users that are interested in Threatelligence are comparing it to the libraries listed below
Sorting:
- Threat Intelligence APIs☆280Aug 14, 2023Updated 2 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 8 months ago
- Gather and compile open source threat intelligence feeds.☆40Feb 19, 2022Updated 4 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 11 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Cyber Intel Management☆51Jan 25, 2018Updated 8 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- Website letting users query information from many different security threat intelligence APIs☆26Sep 30, 2020Updated 5 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- Multithreaded threat Intelligence gathering built with Python3☆178Jan 23, 2018Updated 8 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 11 years ago
- Cyber Threat Intelligence Feeds☆98Sep 26, 2016Updated 9 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆129Aug 28, 2015Updated 10 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- ☆34May 4, 2020Updated 5 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- CRITs - Collaborative Research Into Threats☆911Jul 29, 2019Updated 6 years ago
- Python based client for IBM XForce Exchange☆26Aug 5, 2016Updated 9 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- Automater - IP URL and MD5 OSINT Analysis☆553Aug 13, 2024Updated last year
- ☆305May 28, 2017Updated 8 years ago
- Incident Response Forensic Framework☆612Nov 20, 2019Updated 6 years ago
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 8 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Feb 7, 2017Updated 9 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- Bro scripts written by CrowdStrike Services☆150May 3, 2021Updated 4 years ago
- Machinae Security Intelligence Collector☆539May 15, 2024Updated last year
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 13 years ago