treyka / threaty_threategoLinks
Maltego entity pack encompassing the entire STIX 1.2 data model and a targeted subset of the CybOX 2.1 data model
☆11Updated 9 years ago
Alternatives and similar repositories for threaty_threatego
Users that are interested in threaty_threatego are comparing it to the libraries listed below
Sorting:
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- automate your MISP installs☆68Updated 5 years ago
- Hunting IOCs all day every day...☆86Updated last year
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Maltego Transform to put entities into MISP events☆28Updated 4 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated last year
- Maltego transforms for the ThreatCrowd search API☆49Updated 7 years ago
- Please use https://github.com/veeral-patel/true-positive instead☆69Updated 2 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- Cyber Threat Intelligence Feeds☆68Updated last year
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- Different tools, koen.vanimpe@cudeso.be☆136Updated 2 months ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 11 months ago
- Public Maltego Transforms☆24Updated 8 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Maltego integration of https://haveibeenpwned.com☆61Updated 6 months ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 4 years ago
- the fastest way to consume threat intelligence.☆31Updated 2 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆31Updated 4 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- MantaRay Automated Computer Forensic Triage Tool☆63Updated 6 years ago