All Projects → SamsungLabs → TwiTi

SamsungLabs / TwiTi

Licence: Apache-2.0 license
This is a project of "#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to TwiTi

d4-core
D4 core software (server and sample sensor client)
Stars: ✭ 40 (-66.67%)
Mutual labels:  threat-intelligence
SSHapendoes
Capture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-74.17%)
Mutual labels:  threat-intelligence
MindMaps
#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+86.67%)
Mutual labels:  threat-intelligence
threat-intel
Signatures and IoCs from public Volexity blog posts.
Stars: ✭ 130 (+8.33%)
Mutual labels:  threat-intelligence
docker-misp
A (nearly) production ready Dockered MISP
Stars: ✭ 184 (+53.33%)
Mutual labels:  threat-intelligence
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-75.83%)
Mutual labels:  threat-intelligence
mail to misp
Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Stars: ✭ 61 (-49.17%)
Mutual labels:  threat-intelligence
coronavirus-covid-19-SARS-CoV-2-IoCs
All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns
Stars: ✭ 67 (-44.17%)
Mutual labels:  threat-intelligence
malware-persistence
Collection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (-9.17%)
Mutual labels:  threat-intelligence
Phishruffus
Intelligent threat hunter and phishing servers
Stars: ✭ 44 (-63.33%)
Mutual labels:  threat-intelligence
ThreatIntelligence
Tracking APT IOCs
Stars: ✭ 23 (-80.83%)
Mutual labels:  threat-intelligence
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+78.33%)
Mutual labels:  threat-intelligence
awesome-malware-analysis
Defund the Police.
Stars: ✭ 9,181 (+7550.83%)
Mutual labels:  threat-intelligence
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+463.33%)
Mutual labels:  threat-intelligence
sqhunter
A simple threat hunting tool based on osquery, Salt Open and Cymon API
Stars: ✭ 64 (-46.67%)
Mutual labels:  threat-intelligence
Public-Intelligence-Feeds
Standard-Format Threat Intelligence Feeds
Stars: ✭ 60 (-50%)
Mutual labels:  threat-intelligence
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-34.17%)
Mutual labels:  threat-intelligence
Scrummage
The Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (+195.83%)
Mutual labels:  threat-intelligence
FireHOL-IP-Aggregator
Application for keeping feeds from FireHOL https://github.com/firehol/blocklist-ipsets with IP addresses appearance history. HTTP-based API service is developed for search requests.
Stars: ✭ 26 (-78.33%)
Mutual labels:  threat-intelligence
Azure-Sentinel-4-SecOps
Microsoft Sentinel SOC Operations
Stars: ✭ 140 (+16.67%)
Mutual labels:  threat-intelligence

TwiTi

TwiTi, a tool for extracting IOCs from tweets, can collect a large number of fresh, accurate IOCs.
TwiTi does

  • classifying whether a tweet contains IOCs or not.
  • extracting IOCs from a tweet and also from links mentioned in a tweet.

For more details please refer to our paper,
"#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)
Also, you can find supplementary materials of the paper in data directory.

Requirements

Python

Python 3.7+

pip install -r requirements.txt

NER

TwiTi utilizes NER model for text processing. NER model should be built before run.
Please refer to ner/README.md for more information.

Run

Run commands below in TwiTi directory

IOC extraction

python -m ioc_extractor --help

Tweet classification

python -m classifier --help

Remarks on data license

License may change over time. Almost all the data owners state that they may revise ToS at any time without notice. For example, at the time of our investigation, AlienVault did not provide any legal terms about OTX data usage right in its End-User License Agreement. We instead found the following statement in its website.

Most threat data sharing products or services are limited in what they provide or require users to pay extra for what the provider deems as "premium" features. ... OTX alleviates that problem by providing a comprehensive threat intelligence service that’s 100% free, along with multiple methods for your security tools.

Hence, we interpreted AlienVault OTX as being "available for commercial use". However, its End-User License Agreement has been updated since April 2021 and it now clearly states that

OTX is free to end users for non-commercial use.

This license restriction affects on the amount of IOCs by data use restriction in Section 5.1 of our paper.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].