ThreatingestorExtract and aggregate threat intelligence.
Stars: ✭ 439 (-22.3%)
DovehawkDovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings
Stars: ✭ 97 (-82.83%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+120.88%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+516.81%)
Misp GalaxyClusters and elements to attach to MISP events or attributes (like threat actors)
Stars: ✭ 276 (-51.15%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-96.11%)
BesafeBeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-96.28%)
PhishingkithunterFind phishing kits which use your brand/organization's files and image.
Stars: ✭ 177 (-68.67%)
mail to mispConnect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Stars: ✭ 61 (-89.2%)
Threatbus🚌 The missing link to connect open-source threat intelligence tools.
Stars: ✭ 139 (-75.4%)
MindMaps#ThreatHunting #DFIR #Malware #Detection Mind Maps
Stars: ✭ 224 (-60.35%)
PatrowlenginesPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 162 (-71.33%)
DnstwistDomain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+452.92%)
MihariA helper to run OSINT queries & manage results continuously
Stars: ✭ 239 (-57.7%)
OSINT-BrazucaRepositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Stars: ✭ 508 (-10.09%)
Signature BaseSignature base for my scanner tools
Stars: ✭ 1,212 (+114.51%)
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-87.08%)
OpensquatDetection of phishing domains and domain squatting. Supports permutations such as homograph attack, typosquatting and bitsquatting.
Stars: ✭ 149 (-73.63%)
Threat IntelArchive of publicly available threat INTel reports (mostly APT Reports but not limited to).
Stars: ✭ 252 (-55.4%)
Threat HuntingPersonal compilation of APT malware from whitepaper releases, documents and own research
Stars: ✭ 219 (-61.24%)
IntelowlIntel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+274.16%)
pybinaryedgePython 3 Wrapper for the BinaryEdge API https://www.binaryedge.io/
Stars: ✭ 16 (-97.17%)
malware-persistenceCollection of malware persistence and hunting information. Be a persistent persistence hunter!
Stars: ✭ 109 (-80.71%)
MthcAll-in-one bundle of MISP, TheHive and Cortex
Stars: ✭ 134 (-76.28%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-84.25%)
PatrowlmanagerPatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (-35.75%)
OsweepDon't Just Search OSINT. Sweep It.
Stars: ✭ 225 (-60.18%)
SSHapendoesCapture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-94.51%)
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-87.79%)
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (-54.69%)
IronNetTRThreat research and reporting from IronNet's Threat Research Teams
Stars: ✭ 36 (-93.63%)
ScrummageThe Ultimate OSINT and Threat Hunting Framework
Stars: ✭ 355 (-37.17%)
PatrowldocsPatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Stars: ✭ 105 (-81.42%)
sqhunterA simple threat hunting tool based on osquery, Salt Open and Cymon API
Stars: ✭ 64 (-88.67%)
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (-42.65%)
irmaenpoint detection / live analysis & sandbox host / signatures quality test
Stars: ✭ 25 (-95.58%)
AttackdatamapA datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
Stars: ✭ 264 (-53.27%)
DaProfilerDaProfiler allows you to create a profile on your target based in France only. The particularity of this program is its ability to find the e-mail addresses your target.
Stars: ✭ 58 (-89.73%)
HelkThe Hunting ELK
Stars: ✭ 3,097 (+448.14%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-87.61%)
ayashigeAyashige provides a list of suspicious newly updated domains as a JSON feed
Stars: ✭ 27 (-95.22%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-96.11%)
Python IocextractDefanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (-46.9%)
ThreatpinchlookupDocumentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Stars: ✭ 257 (-54.51%)
connectorsOpenCTI connectors
Stars: ✭ 135 (-76.11%)
Apt HunterAPT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
Stars: ✭ 297 (-47.43%)
freki🐺 Malware analysis platform
Stars: ✭ 327 (-42.12%)
fastfinderIncident Response - Fast suspicious file finder
Stars: ✭ 116 (-79.47%)
MalwareHashDBMalware hashes for open source projects.
Stars: ✭ 31 (-94.51%)
misp-takedownA curses-style interface for automatic takedown notification based on MISP events.
Stars: ✭ 19 (-96.64%)