Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
-
Updated
Nov 16, 2024 - Python
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Your Everyday Threat Intelligence
Extract and aggregate threat intelligence.
Defanged Indicator of Compromise (IOC) Extractor.
Python library using the MISP Rest API
TAXII server implementation in Python from EclecticIQ
CIF v3 -- the fastest way to consume threat intelligence
Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security related information) from text. It uses grammars rather than regexes which makes it more readable, maintainable, and hackable. Explore our interactive documentation here: https://hightower.space/ioc-finder/
TAXII client implementation from EclecticIQ
A utility repo to assist with converting between MISP and STIX formats
Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Malicious IP source.
The Project can be used to integrate QRadar with MISP Threat Sharing Platform
the fastest way to consume threat intelligence.
The Fastest way to consume Threat Intel
A curses-style interface for automatic takedown notification based on MISP events.
Python bindings for Yeti's API
Script to interface MISP with Facebook ThreatExchange
Python-based cloud node for local use
python implementation of the indicator-protocol
Add a description, image, and links to the threat-sharing topic page so that developers can more easily learn about it.
To associate your repository with the threat-sharing topic, visit your repo's landing page and select "manage topics."