TheHive: a Scalable, Open Source and Free Security Incident Response Platform
-
Updated
Sep 30, 2020 - JavaScript
{{ message }}
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
Cortex: a Powerful Observable Analysis and Active Response Engine
Documentation of TheHive
The OSINT Omnibus (beta release)
本项目致力于收集网上公开来源的威胁情报,主要关注信誉类威胁情报(如IP/域名等),以及事件类威胁情报。
Extract indicators of compromise from text, including "escaped" ones.
Historical list of {Cobalt Strike,NanoHTTPD} servers
Explore Indicators of Compromise Automatically
Operation Wocao - Indicators of Compromise
Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).
DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform
Cortex jobs automation for TheHive
Quick method to extract Indicators of Compromise (IOCs) from a Threat Intel Report in PDF format.
Threat Intelligence & Indicators of Compromise repository.
Add a description, image, and links to the iocs topic page so that developers can more easily learn about it.
To associate your repository with the iocs topic, visit your repo's landing page and select "manage topics."