Otx mispImports Alienvault OTX pulses to a MISP instance
Stars: ✭ 45 (-59.46%)
ct-woodpeckerA tool to monitor a certificate transparency log for operational problems
Stars: ✭ 136 (+22.52%)
XipkiHighly scalable and high-performance open source PKI (CA and OCSP responder). Minimal dependencies, No-JPA, No-Spring
Stars: ✭ 311 (+180.18%)
GosintThe GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).
Stars: ✭ 482 (+334.23%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-77.48%)
sqhunterA simple threat hunting tool based on osquery, Salt Open and Cymon API
Stars: ✭ 64 (-42.34%)
Python IocextractDefanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (+170.27%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (+101.8%)
MalcomMalcom - Malware Communications Analyzer
Stars: ✭ 988 (+790.09%)
Misp GalaxyClusters and elements to attach to MISP events or attributes (like threat actors)
Stars: ✭ 276 (+148.65%)
DovehawkDovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings
Stars: ✭ 97 (-12.61%)
SSHapendoesCapture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-72.07%)
DnstwistDomain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+2714.41%)
ct-honeybeeLightweight program that pollinates STHs between Certificate Transparency logs and auditors
Stars: ✭ 25 (-77.48%)
SysmontoolsUtilities for Sysmon
Stars: ✭ 903 (+713.51%)
freki🐺 Malware analysis platform
Stars: ✭ 327 (+194.59%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-34.23%)
threat-intelSignatures and IoCs from public Volexity blog posts.
Stars: ✭ 130 (+17.12%)
SyntheticSunSyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, managed AWS security services and, serverless technologies to continuously prevent, detect and respond to threats.
Stars: ✭ 49 (-55.86%)
tlsassistantFully-featured tool that combines state-of-the-art TLS analyzers with a report system that suggests appropriate mitigations and shows the full set of viable attacks.
Stars: ✭ 24 (-78.38%)
Sn0intSemi-automatic OSINT framework and package manager
Stars: ✭ 814 (+633.33%)
nsm-attackMapping NSM rules to MITRE ATT&CK
Stars: ✭ 53 (-52.25%)
CCXDiggerThe CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Stars: ✭ 45 (-59.46%)
PatrowldocsPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (-5.41%)
Threat IntelArchive of publicly available threat INTel reports (mostly APT Reports but not limited to).
Stars: ✭ 252 (+127.03%)
pybinaryedgePython 3 Wrapper for the BinaryEdge API https://www.binaryedge.io/
Stars: ✭ 16 (-85.59%)
MihariA helper to run OSINT queries & manage results continuously
Stars: ✭ 239 (+115.32%)
HarpoonCLI tool for open source and threat intelligence
Stars: ✭ 679 (+511.71%)
DaProfilerDaProfiler allows you to create a profile on your target based in France only. The particularity of this program is its ability to find the e-mail addresses your target.
Stars: ✭ 58 (-47.75%)
Awesome DevsecopsAn authoritative list of awesome devsecops tools with the help from community experiments and contributions.
Stars: ✭ 2,805 (+2427.03%)
Ioc2rpzioc2rpz is a place where threat intelligence meets DNS.
Stars: ✭ 67 (-39.64%)
Misp ModulesModules for expansion services, import and export in MISP
Stars: ✭ 198 (+78.38%)
ayashigeAyashige provides a list of suspicious newly updated domains as a JSON feed
Stars: ✭ 27 (-75.68%)
Misp WarninglistsWarning lists to inform users of MISP about potential false-positives or other information in indicators
Stars: ✭ 184 (+65.77%)
KlaraKaspersky's GReAT KLara
Stars: ✭ 565 (+409.01%)
Sweetie DataThis repo contains logstash of various honeypots
Stars: ✭ 163 (+46.85%)
connectorsOpenCTI connectors
Stars: ✭ 135 (+21.62%)
OpensquatDetection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (+34.23%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-19.82%)
DnsmorphDomain name permutation engine written in Go
Stars: ✭ 148 (+33.33%)
OSINT-BrazucaRepositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Stars: ✭ 508 (+357.66%)
OpenctiAuthors
Stars: ✭ 2,165 (+1850.45%)
CertspotterCertificate Transparency Log Monitor
Stars: ✭ 497 (+347.75%)
Threatbus🚌 The missing link to connect open-source threat intelligence tools.
Stars: ✭ 139 (+25.23%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-80.18%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (+18.92%)
MatireMalware Analysis, Threat Intelligence and Reverse Engineering: LABS
Stars: ✭ 55 (-50.45%)
ct-submitA program for submitting X.509 certificate chains to Certificate Transparency log servers.
Stars: ✭ 77 (-30.63%)
Analyzer🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (-2.7%)
PygreynoisePython3 library and command line for GreyNoise
Stars: ✭ 100 (-9.91%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+1024.32%)
WhitehatInformation about my experiences on ethical hacking 💀
Stars: ✭ 54 (-51.35%)
ThreatingestorExtract and aggregate threat intelligence.
Stars: ✭ 439 (+295.5%)