treyka / threaty_threategoLinks
Maltego entity pack encompassing the entire STIX 1.2 data model and a targeted subset of the CybOX 2.1 data model
☆11Updated 9 years ago
Alternatives and similar repositories for threaty_threatego
Users that are interested in threaty_threatego are comparing it to the libraries listed below
Sorting:
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- automate your MISP installs☆68Updated 5 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Maltego Transform to put entities into MISP events☆28Updated 4 years ago
- Maltego transforms for the ThreatCrowd search API☆49Updated 7 years ago
- Public Maltego Transforms☆24Updated 8 years ago
- Cyber Threat Intelligence Feeds☆68Updated last year
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Hunting IOCs all day every day...☆86Updated last year
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- Different tools, koen.vanimpe@cudeso.be☆136Updated 2 weeks ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 10 months ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 8 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 3 weeks ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- Maltego integration of https://haveibeenpwned.com☆61Updated 4 months ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Slides and Other Resources from my latest Talks and Presentations☆24Updated 4 years ago
- IntelMQ command line tool to process events and send out email notifications.☆9Updated last week
- MantaRay Automated Computer Forensic Triage Tool☆64Updated 6 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago