All Projects → TheHive-Project → Cortex

TheHive-Project / Cortex

Licence: agpl-3.0
Cortex: a Powerful Observable Analysis and Active Response Engine

Programming Languages

python
139335 projects - #7 most used programming language
scala
5932 projects

Projects that are alternatives of or similar to Cortex

Thehivedocs
Documentation of TheHive
Stars: ✭ 353 (-47.78%)
Mutual labels:  api, rest, free, free-software, open-source, dfir, incident-response, digital-forensics, analyzer
Thehive
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
Stars: ✭ 2,300 (+240.24%)
Mutual labels:  api, rest, free, open-source, dfir, incident-response, digital-forensics, analyzer
Cortex Analyzers
Cortex Analyzers Repository
Stars: ✭ 246 (-63.61%)
Mutual labels:  observable, free, free-software, open-source, dfir, incident-response, digital-forensics, analyzer
Thehive4py
Python API Client for TheHive
Stars: ✭ 143 (-78.85%)
Mutual labels:  api, free, free-software, open-source, dfir, incident-response, digital-forensics
Cortex4py
Python API Client for Cortex
Stars: ✭ 22 (-96.75%)
Mutual labels:  api, free-software, open-source, dfir, incident-response
Ngx Restangular
Restangular for Angular 2 and higher versions
Stars: ✭ 787 (+16.42%)
Mutual labels:  api, rest, observable, response
Uebergame
Uebergame code repository
Stars: ✭ 90 (-86.69%)
Mutual labels:  free, free-software, engine, open-source
Awesome Forensics
A curated list of awesome forensic analysis tools and resources
Stars: ✭ 1,775 (+162.57%)
Mutual labels:  free, open-source, dfir, digital-forensics
Imaginary Teleprompter
Professional grade, free software, teleprompter app.
Stars: ✭ 157 (-76.78%)
Mutual labels:  free, free-software, open-source
Intelowl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+212.72%)
Mutual labels:  observable, free-software, incident-response
Im ios
GoBelieveIO IM iOS sdk
Stars: ✭ 116 (-82.84%)
Mutual labels:  free, free-software, open-source
Apicache
Simple API-caching middleware for Express/Node.
Stars: ✭ 957 (+41.57%)
Mutual labels:  api, rest, response
Examples
Examples of Mock Service Worker usage with various frameworks and libraries.
Stars: ✭ 163 (-75.89%)
Mutual labels:  api, rest, response
Im android
GoBelieveIO IM android sdk
Stars: ✭ 167 (-75.3%)
Mutual labels:  free, free-software, open-source
Hippocampe
Threat Feed Aggregation, Made Easy
Stars: ✭ 149 (-77.96%)
Mutual labels:  free, free-software, open-source
MemProcFS-Analyzer
MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR
Stars: ✭ 89 (-86.83%)
Mutual labels:  incident-response, dfir, digital-forensics
INDXRipper
Carve file metadata from NTFS index ($I30) attributes
Stars: ✭ 32 (-95.27%)
Mutual labels:  incident-response, dfir, digital-forensics
WELA
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Stars: ✭ 442 (-34.62%)
Mutual labels:  analysis, dfir, response
Avideo
Create Your Own Broadcast Network With AVideo Platform Open-Source. OAVP OVP
Stars: ✭ 1,329 (+96.6%)
Mutual labels:  free, free-software, open-source
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+0%)
Mutual labels:  incident-response, free, digital-forensics

Join the chat at https://gitter.im/TheHive-Project/TheHive

Cortex tries to solve a common problem frequently encountered by SOCs, CSIRTs and security researchers in the course of threat intelligence, digital forensics and incident response: how to analyze observables they have collected, at scale, by querying a single tool instead of several?

Cortex, an open source and free software, has been created by TheHive Project for this very purpose. Observables, such as IP and email addresses, URLs, domain names, files or hashes, can be analyzed one by one or in bulk mode using a Web interface. Analysts can also automate these operations thanks to the Cortex REST API.

By using Cortex, you won't need to rewrite the wheel every time you'd like to use a service or a tool to analyze an observable and help you investigate the case at hand. Leverage one of the several analyzers it contains and if you are missing a tool or a service, create a suitable program easily and make it available for the whole team (or better, for the whole community) thanks to Cortex.

Cortex and TheHive

Along with MISP, Cortex is the perfect companion for TheHive. TheHive let you analyze tens or hundreds of observables in a few clicks by leveraging one or several Cortex instances depending on your OPSEC needs and performance requirements. Moreover, TheHive comes with a report template engine that allows you to adjust the output of Cortex analyzers to your taste instead of having to create your own JSON parsers for Cortex output.

Cortex and MISP

Cortex can be integrated with MISP in two ways:

Try it

To try Cortex, you can use the training VM or install it by reading the Installation Guide.

Details

Architecture

Cortex is written in Scala. The front-end uses AngularJS with Bootstrap. Its REST API is stateless which allows it to be horizontally scalable. The provided analyzers are written in Python. Additional analyzers may be written using the same language or any other language supported by Linux.

Analyzers

Thanks to Cortex, you can analyze different types of observables using tens of analyzers. As of April 14, 2018, there are 39 publicly available analyzers. Most analyzers come in different flavors. For example, using the VirusTotal analyzer, you can submit a file to VT or simply check the latest available report associated with a file or a hash. The full analyzer list, including flavors and requirements, is maintained in the Cortex Analyzers Requirements Guide.

Documentation

We have made several guides available in the Documentation repository.

License

Cortex is an open source and free software released under the AGPL (Affero General Public License). We, TheHive Project, are committed to ensure that Cortex will remain a free and open source project on the long-run.

Updates

Information, news and updates are regularly posted on TheHive Project Twitter account and on the blog.

Contributing

We welcome your contributions, particularly new analyzers that can take away the load off overworked fellow analysts. Please feel free to fork the code, play with it, make some patches and send us pull requests using issues.

We do have a Code of conduct. Make sure to check it out before contributing.

Support

Please open an issue on GitHub if you'd like to report a bug or request a feature.

Important Note: if you encounter an issue with an analyzer or would like to request a new one or an improvement to an existing analyzer, please open an issue on the analyzers' dedicated GitHub repository. If you have problems with TheHive or would like to request a TheHive-related feature, please open an issue on its dedicated GitHub repository.

Alternatively, if you need to contact the project team, send an email to [email protected].

Community Discussions

We have set up a Google forum at https://groups.google.com/a/thehive-project.org/d/forum/users. To request access, you need a Google account. You may create one using a Gmail address or without one.

Website

https://thehive-project.org/

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].