There are 5 repositories under threatintelligence topic.
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Actionable analytics designed to combat threats
This repository contains indicators of compromise (IOCs) of our various investigations.
A collection of intelligence about Log4Shell and its exploitation activity.
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
BlackBerry Threat Research & Intelligence
A reverse search tool for OSINT (Open Source Intelligence) gathering & facial recognition via Google Custom Search & Google Vision API's.
Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack
Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.
Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.
IOCs that appear in this repository are meant to be long-lasting indicators of compromise.
A collection of Go tools I make while I learn a little about GoLang.
A new way for you to structure your threat content.
Publicly available threat intelligence reports
Synapse-Onyphe is a Rapid Power-Up for the Onyphe platform
Supporting material for my presentation "Zero to Hero: Proactive Infrastructure Hunting"
A dockerfile for the MISP project based on alpine Linux.
Simplifies the process of gathering information about Indicators of Compromise
Discover an awesome compilation of tools, libraries, and resources for robust security. From network to web security, find everything you need to enhance your security expertise.
“I clicked on something and it all disappeared,” is a common fear of those who use cryptocurrency for the first time. This article is about what not to do - we will tell you the 10 most common ways to lose your crypto.