TheHive: a Scalable, Open Source and Free Security Incident Response Platform
-
Updated
Dec 5, 2022 - Scala
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
Documentation of TheHive
Real-time HTTP Intrusion Detection
Cortex: a Powerful Observable Analysis and Active Response Engine
ๆฌ้กน็ฎ่ดๅไบๆถ้็ฝไธๅ ฌๅผๆฅๆบ็ๅจ่ๆ ๆฅ๏ผไธป่ฆๅ ณๆณจไฟก่ช็ฑปๅจ่ๆ ๆฅ๏ผๅฆIP/ๅๅ็ญ๏ผ๏ผไปฅๅไบไปถ็ฑปๅจ่ๆ ๆฅใ
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
Repository of YARA rules made by Trellix ATR Team
The OSINT Omnibus (beta release)
Historical list of {Cobalt Strike,NanoHTTPD} servers
Bringing you the best of the worst files on the Internet.
Automatically created C2 Feeds
Awesome list of keywords and artifacts for Threat Hunting sessions
Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security related information) from text. It uses grammars rather than regexes which makes it more readable, maintainable, and hackable. Explore our interactive documentation here: https://hightower.space/ioc-finder/
Awesome Security lists for SOC/CERT/CTI
Open Dataset of Cobalt Strike Beacon metadata (2018-2022)
Explore Indicators of Compromise Automatically
Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)
๐พ ๐๐ผ๐ผ๐น๐ ๐ณ๐ผ๐ฟ ๐๐ฒ๐ฐ๐๐ฟ๐ถ๐๐ ๐ฟ๐ฒ๐๐ฒ๐ฎ๐ฟ๐ฐ๐ต๐ฒ๐ฟ๐: ๐ฝ๐ฒ๐ป๐๐ฒ๐๐๐ถ๐ป๐ด, ๐๐ง๐๐ & ๐๐ฎ๐ฟ๐ด๐ฎ๐บ๐ฒ๐
BlackBerry Threat Research & Intelligence
Extract indicators of compromise from text, including "escaped" ones.
Add a description, image, and links to the iocs topic page so that developers can more easily learn about it.
To associate your repository with the iocs topic, visit your repo's landing page and select "manage topics."