DFIR IoC Unit Testing
-
Updated
Jul 27, 2020 - Python
DFIR IoC Unit Testing
A script to create every available object in ThreatConnect.
an awesome list of honeypot resources
Script to interface MISP with Facebook ThreatExchange
Analyst tools to speed up interacting with the Blockade cloud node
The Fastest way to consume Threat Intel
Malicious IP source.
Python-based cloud node for local use
A curses-style interface for automatic takedown notification based on MISP events.
Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Python bindings for Yeti's API
python implementation of the indicator-protocol
the fastest way to consume threat intelligence.
TAXII client implementation from EclecticIQ
The Project can be used to integrate QRadar with MISP Threat Sharing Platform
A utility repo to assist with converting between MISP and STIX formats
Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security related information) from text. It uses grammars rather than regexes which makes it more readable, maintainable, and hackable. Explore our interactive documentation here: https://hightower.space/ioc-finder/
CIF v3 -- the fastest way to consume threat intelligence
TAXII server implementation in Python from EclecticIQ
Add a description, image, and links to the threat-sharing topic page so that developers can more easily learn about it.
To associate your repository with the threat-sharing topic, visit your repo's landing page and select "manage topics."