Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for threat intelligence
threat-intelligence
x
369 search results found
Chatter
⭐
137
internet monitoring osint telegram bot for windows
Subcrawl
⭐
134
SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data with optional output modules, such as MISP.
Typedb Cti
⭐
134
Open Source Threat Intelligence Platform
Malware Persistence
⭐
134
Collection of malware persistence and hunting information. Be a persistent persistence hunter!
Docintel
⭐
133
Open Source Platform for storing, organizing, and searching documents related to cyber threats
Threat Intel
⭐
130
Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS
Docker Misp
⭐
129
Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing
Raven
⭐
125
Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
Cti Lexicon
⭐
120
Dictionary of CTI-related acronyms, terms, and jargon
Infosec And Hacking Scripts
⭐
118
🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier🌠. Have fun!😎
Patrowldocs
⭐
118
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Threatintel
⭐
117
Awesome Fofa
⭐
116
The FOFA Library collects usage tips, common scenarios, F&Q, and more for FOFA.
Greedybear
⭐
116
Threat Intel Platform for T-POTs
Analyst Arsenal
⭐
114
A toolkit for Security Researchers
Certstreammonitor
⭐
114
Monitor certificates generated for specific domain strings and associated, store data into sqlite3 database, alert you when sites come online.
Orcs
⭐
113
OSINT Resource Classification System
Insiders
⭐
111
Archive of Potential Insider Threats
Dovehawk
⭐
107
Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings
Blackips
⭐
103
开源威胁情报,包含3个组件,2个查询API,1个前端,300万+恶意IP,Go +Redis开发的威胁情报查询API性能良好,恶意IP一直在更新。
Murmurhash
⭐
101
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Docker Misp
⭐
101
Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing
Passive Ssh
⭐
99
A Passive SSH back-end and scanner.
Daprofiler
⭐
97
DaProfiler allows you to create a profile on your target based in France only. The particularity of this program is its ability to find the e-mail addresses your target.
Cabby
⭐
95
TAXII client implementation from EclecticIQ
Jupyter Collection
⭐
94
Collection of Jupyter Notebooks by @fr0gger_
Ioc2rpz
⭐
93
ioc2rpz is a place where threat intelligence meets DNS.
Mimir
⭐
89
OSINT Threat Intel Interface - CLI for HoneyDB
Argos
⭐
86
This script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Client Python
⭐
82
OpenCTI Python Client
Malware Feed
⭐
82
Bringing you the best of the worst files on the Internet.
Intelowl Ng
⭐
81
IntelOwl's Web Interface. Built with Angular 10.
Awesome Cybersecurity
⭐
81
Curated list of awesome cybersecurity companies and solutions.
Pyvfeed
⭐
81
Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions
Awesome Malware Persistence
⭐
78
A curated list of awesome malware persistence tools and resources.
Threat_intelligence
⭐
76
Threat-Intelligence Feeds & Tools & Frameworks
Controlcompass.github.io
⭐
76
Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques
Delator
⭐
73
Golang-based subdomain miner leveraging certificate transparency logs
Url Shorteners
⭐
73
A comprehensive, high-quality URL shorteners domain list for whitelist/allowlist or blacklist/blocklist purposes, utilized by NextDNS, ControlD, RethinkDNS, dnslow.me, and other OSINT projects.
Public Intelligence Feeds
⭐
72
Standard-Format Threat Intelligence Feeds
Awesome Annual Security Reports
⭐
70
A curated list of annual cyber security reports
Onenoteanalyzer
⭐
69
A C# based tool for analysing malicious OneNote documents
Threatmodel Sdk
⭐
68
A Java library for parsing and programmatically using threat models
Whitehat
⭐
66
Information about my experiences in cybersecurity 💀
Coronavirus Covid 19 Sars Cov 2 Iocs
⭐
66
All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns
Rust Malware Gallery
⭐
66
A collection of malware families and malware samples which use the Rust programming language.
Ioc Explorer
⭐
66
Explore Indicators of Compromise Automatically
Sqhunter
⭐
65
A simple threat hunting tool based on osquery, Salt Open and Cymon API
Mail_to_misp
⭐
65
Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Cbfeeds
⭐
65
Carbon Black Feeds
Indicator Intelligence
⭐
65
Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.
Ctim
⭐
63
Cisco Threat Intellligence Model
Ail Typo Squatting
⭐
63
Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.
Misp Osint Collection
⭐
61
Collection of best practices to add OSINT into MISP and/or MISP communities
Secbert
⭐
61
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
Malwarehashdb
⭐
59
Malware hashes for open source projects.
Check_rep
⭐
58
Check IP or Domain reputation against open-source Blacklists.
Chkdomain
⭐
57
🔍 Discover if a domain is resolvable or blocked by secure DNS and Ad-blocking services, and experience the innovative idea of DaaS - DNS as an Intelligence Service.
Cif V5
⭐
56
The FASTEST way to consume threat intel.
Vulnerability Data Archive
⭐
56
With the hope that someone finds the data useful, we periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archi
Threat Intel Templates
⭐
56
A set of templates for documenting threat intelligence
Cyber_threat_intelligence
⭐
55
Cyber Threat Intelligence Data, Indicators, and Analysis
Ioc Fanger
⭐
52
Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Blockchain Threat Intelligence
⭐
51
Blockchain Threat Intelligence Sharing Platform(区块链威胁情报共享平台)
Favihunter
⭐
51
Hunting assets on the internet using favicon hashes
Crazywall
⭐
50
digital evidence board aka detective suite, aka CrazyWall
Ioc Extractor
⭐
49
An npm package for extracting common IoC (Indicator of Compromise) from a block of text
Ransomware.live
⭐
49
🏴☠️💰 Another Ransomware gang tracker
Cybersecurity Red Team
⭐
49
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Red Team (Offensive) in Cybersecurity.
Wafaray
⭐
49
Enhance your malware detection with WAF + YARA (WAFARAY)
Koodousfinder
⭐
48
A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities
Osint Brazuca Nuclei Templates
⭐
47
Repositório criado com intuito de reunir templates da ferramenta Nuclei dentro do contexto Brasil
Matire
⭐
47
Malware Analysis, Threat Intelligence and Reverse Engineering: LABS
Melody
⭐
46
Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulation.
Threat Hostlist
⭐
46
Comprehensive domain blocklists for 🚨 threats (🕷malware, 🎣phishing, 🕵️spyware, 🤖botnets). Ideal for DNS-based filtering tools like Pi-Hole, AdGuard Home, Blocky.
Exploring Apt Campaigns
⭐
44
Further investigation in to APT campaigns disclosed by private security firms and security agencies
Threatreportextractor
⭐
44
Extracting Attack Behavior from Threat Reports
Threat Intelligence.eu
⭐
44
threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intelligence
Rajappan
⭐
44
An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE
Awesome Docker Malware Analysis
⭐
42
Repository of tools and resources for analyzing Docker containers
Ironnettr
⭐
41
Threat research and reporting from IronNet's Threat Research Teams
D4 Core
⭐
40
D4 core software (server and sample sensor client)
Threat Actor Intelligence Server
⭐
40
A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the known threat actors.
Cobaltstrike Beacon Data
⭐
40
Open Dataset of Cobalt Strike Beacon metadata (2018-2022)
Best Practices In Threat Intelligence
⭐
40
Best practices in threat intelligence
Ail Typo Website
⭐
40
Website for ail-typo-squatting library
Otx_misp
⭐
37
Imports Alienvault OTX pulses to a MISP instance
Conference Talks
⭐
37
Slides for my conference talks
Misp Wireshark
⭐
37
Lua plugin to extract data from Wireshark and convert it into MISP format
Censys Recon Ng
⭐
36
recon-ng modules for Censys
Opentpx
⭐
35
Open Threat Partner eXchange
Utmstack
⭐
34
Customizable SIEM and XDR powered by Real-Time correlation and Threat Intelligence
Gdpatrol
⭐
31
A Lambda-powered Security Orchestration framework for AWS GuardDuty
Firehol Ip Aggregator
⭐
31
App for storing FireHOL feeds (https://github.com/firehol/blocklist-ipsets) with a history of adding and removing each address
Pktintel
⭐
31
Tool used to perform threat intelligence against packet data
Logboost
⭐
31
Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, Domain, ASN, DNS and Threat Indicator matches.
Sshapendoes
⭐
31
Capture passwords of login attempts on non-existent and disabled accounts.
Ayashige
⭐
31
Ayashige provides a list of suspicious newly updated domains as a JSON feed
Adversarial Threat Modelling
⭐
31
Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"
Rstthreats
⭐
30
Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
101-200 of 369 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.