🧰 Tools to Gather Threat Intelligence from ‘IBM’ ‘X-Force’
-
Updated
Dec 11, 2018 - R
🧰 Tools to Gather Threat Intelligence from ‘IBM’ ‘X-Force’
Collection of Suricata rule sets that I use modified to my environments.
Automated use of an IDS and open source intel
Bringing you the best of the worst files on the Internet.
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Decentralized Cyber Threat Intelligence Kaizen Framework
Collection of Azure Sentinel - Playbook | Logic App (Template)
www.spencerwalden.net. Spencer Walden's Infosec blog
Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!
THOTCON 0xB Adversary Detection Pipelines Talk on 10/8/2021 in Chicago, IL.
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
DoveHawk.io Anonymized Outgoing Partial Netflow
threatnote | Cyber Threat Intelligence Notebook
A C# client for Vertex Synapse
Threat Farmer: A threat feed aggregation utility
PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal
Highly configurable scripts for a web scraper intended to be used for cyber threat intelligence
An SSH honeypot written entirely in Go.
Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Add a description, image, and links to the threat-intel topic page so that developers can more easily learn about it.
To associate your repository with the threat-intel topic, visit your repo's landing page and select "manage topics."