Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for threat intelligence dfir
dfir
x
threat-intelligence
x
20 search results found
Intelowl
⭐
2,995
IntelOwl: manage your Threat Intelligence at scale
Signature Base
⭐
2,187
YARA signature and IOC database for my scanners and tools
Yeti
⭐
1,568
Your Everyday Threat Intelligence
Digital Forensics Guide
⭐
1,232
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Malcom
⭐
957
Malcom - Malware Communications Analyzer
Cyberthreathunting
⭐
755
A collection of resources for Threat Hunters - Sponsored by Falcon Guard
Threatingestor
⭐
730
Extract and aggregate threat intelligence.
Sysmon Config
⭐
529
Advanced Sysmon configuration, Installer & Auto Updater with high-quality event tracing
Iocextract
⭐
484
Defanged Indicator of Compromise (IOC) Extractor.
Misp Warninglists
⭐
437
Warning lists to inform users of MISP about potential false-positives or other information in indicators
Threathunting Keywords
⭐
252
Awesome list of keywords for Threat Hunting sessions
Threatpinchlookup
⭐
236
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Mindmaps
⭐
172
#ThreatHunting #DFIR #Malware #Detection Mind Maps
Mthc
⭐
154
All-in-one bundle of MISP, TheHive and Cortex
Check_rep
⭐
58
Check IP or Domain reputation against open-source Blacklists.
Misp Wireshark
⭐
37
Lua plugin to extract data from Wireshark and convert it into MISP format
Logboost
⭐
31
Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, Domain, ASN, DNS and Threat Indicator matches.
Tigma
⭐
24
Sigma Engine implementation in TypeScript
Ccxdigger
⭐
19
The CyberCX Digger project is designed to help Australian organisations determine if they have been impacted by certain high profile cyber security incidents. Digger provides threat hunting functionality packaged in a simple-to-use tool, allowing users to detect certain attacker activities; all for free.
Threathunting Keywords Yara Rules
⭐
17
yara detection rules for hunting with the threathunting-keywords project
Osint_to_timesketch
⭐
13
Virustotal Data to Timesketch
Digitalshadows2th
⭐
9
DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform
Cybersecurity Playground
⭐
6
CyberSecurity Resources (Threat Intelligence, Malware Analysis, Pentesting, DFIR, etc)
1-20 of 20 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.