Process the fortune 1000 domains to identify live typo-sites. Save results into a database for later processing and analysis.
-
Updated
Nov 27, 2016 - Python
Process the fortune 1000 domains to identify live typo-sites. Save results into a database for later processing and analysis.
A simple threat hunting tool based on osquery, Salt Open and Cymon API
Sandbox feed integration in ELK stack for threat intelligence operations
本项目致力于收集网上公开来源的威胁情报,主要关注信誉类威胁情报(如IP/域名等),以及事件类威胁情报。
Malcom - Malware Communications Analyzer
Python low-interaction honeyclient
Digital Forensics Virtual File System (dfVFS)
A SIEM built on Django, inspired by HECTOR
an awesome list of honeypot resources
Detect Phishing Campaigns/Links related to your Organization.
Script for automatically create a case in The Hive and start Cortex analyzers adapted to fit the observables.
Cortex jobs automation for TheHive
Map and visualize SSH logins from sensors.
Script auto generate rules with IOC
Python3 wrapper for the GreyNoise API
Homemade urlscan.io in a docker container
Intelligent threat hunter and phishing servers
Find phishing kits which use your brand/organization's files and image.
Generate a report containing IOCs gathered from VirusTotal and Hybrid-Analysis.
A SIEM inspired by HECTOR, built on Django.
Add a description, image, and links to the threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the threat-intelligence topic, visit your repo's landing page and select "manage topics."