Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect intelligence from custom or public sources. Automatically updates feeds and tries to further enhance data for dashboards.
☆150Jun 3, 2014Updated 11 years ago
Alternatives and similar repositories for Threatelligence
Users that are interested in Threatelligence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat Intelligence APIs☆281Aug 14, 2023Updated 2 years ago
- Gather and compile open source threat intelligence feeds.☆40Feb 19, 2022Updated 4 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 9 months ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago
- Website letting users query information from many different security threat intelligence APIs☆26Sep 30, 2020Updated 5 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- Multithreaded threat Intelligence gathering built with Python3☆177Jan 23, 2018Updated 8 years ago
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 12 years ago
- Cyber Intel Management☆50Jan 25, 2018Updated 8 years ago
- Cyber Threat Intelligence Feeds☆98Sep 26, 2016Updated 9 years ago
- ☆34May 4, 2020Updated 5 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Threat Analysis, Reconnaissance, and Data Intelligence System☆129Aug 28, 2015Updated 10 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 9 years ago
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 11 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆145Nov 26, 2018Updated 7 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- CRITs - Collaborative Research Into Threats☆911Jul 29, 2019Updated 6 years ago
- Machinae Security Intelligence Collector☆540May 15, 2024Updated last year
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- ☆305May 28, 2017Updated 8 years ago
- Incident Response Forensic Framework☆612Nov 20, 2019Updated 6 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆222Jun 7, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆22Jan 2, 2018Updated 8 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- A curated list of Awesome Threat Intelligence resources☆9,991Jan 19, 2026Updated 2 months ago
- ELK configuration files for Forensic Analysts and Incident Handlers (unmaintained)☆179Jul 10, 2019Updated 6 years ago