yaya2devops / gopenctiLinks
On-Premises Open Cyber Threat Intelligence Platform
☆11Updated 11 months ago
Alternatives and similar repositories for gopencti
Users that are interested in gopencti are comparing it to the libraries listed below
Sorting:
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last month
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123Updated 2 years ago
- OpenAEV Docker deployment helpers☆23Updated this week
- Sniffing out well-known threat groups☆61Updated last year
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 8 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆78Updated 5 months ago
- ☆74Updated last week
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆30Updated 2 weeks ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Updated last year
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆57Updated 3 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆159Updated 6 months ago
- ☆31Updated 2 years ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆118Updated last month
- HookPhish is a Python script designed to aid in the detection of phishing websites☆38Updated last year
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆109Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆110Updated 11 months ago
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- Cyber threat intelligence tool suite.☆42Updated 6 months ago
- ☆55Updated last year
- A runbook for handling security incidents in cooperation with 0xsyr0☆51Updated 2 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆31Updated 6 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆56Updated 7 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated 11 months ago
- A list of resources to build a information security team.☆13Updated 4 years ago
- CarbonBlack EDR detection rules and response actions☆72Updated last year
- ☆35Updated 10 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆17Updated 3 months ago
- God Mode Detection Rules☆134Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999☆61Updated last week