The OSINT Omnibus (beta release)
-
Updated
May 20, 2024 - Python
The OSINT Omnibus (beta release)
本项目致力于收集网上公开来源的威胁情报,主要关注信誉类威胁情报(如IP/域名等),以及事件类威胁情报。
Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security related information) from text. It uses grammars rather than regexes which makes it more readable, maintainable, and hackable. Explore our interactive documentation here: https://hightower.space/ioc-finder/
Explore Indicators of Compromise Automatically
Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Malicious IP source.
DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform
Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threatfox.
Enrich IP addresses with metadata and threat intelligence indicators.
A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).
Quick method to extract Indicators of Compromise (IOCs) from a Threat Intel Report in PDF format.
🔍 Application for detecting command and control (C2) communication through network traffic analysis.
A repository dedicated to deliver a comprehensive set of tools for integration and convenient use of Kaspersky Threat Intelligence services
Script for gathering IoCs from Twitter and sending them to MISP.
Scripts, YARA and IOCs from our research on the Blister malware 🩹
Cortex jobs automation for TheHive
Add a description, image, and links to the iocs topic page so that developers can more easily learn about it.
To associate your repository with the iocs topic, visit your repo's landing page and select "manage topics."