Tracking APT IOCs
-
Updated
Nov 16, 2020
Tracking APT IOCs
Tools for working with FIRST IEP (Information Exchange Policy) objects
Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing
a cli swiss army knife for working with Trustar
An AWS Lambda function to export NIDS IOCs from a MISP instance
DFIR IoC Unit Testing
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
rootless Docker MISP Container
Golang implementation of PyMISP-feedgenerator
threatnote | Cyber Threat Intelligence Notebook
Advanced Sysmon configuration, Installer & Auto Updater with high-quality event tracing
A script to create every available object in ThreatConnect.
The goal of Engaged Threat is to provide honeypot researchers the ability to hold the attention of an attacker or to induce the attacker to participate in some sort of increased activity.
an awesome list of honeypot resources
Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.
Script to interface MISP with Facebook ThreatExchange
An SSH honeypot written entirely in Go.
Docker-MISP provides an easy way for deploying MISP instances with simple Docker images.
PowerShell module wrapper for the Collective Intelligence Framework (CIF) v3 API
Add a description, image, and links to the threat-sharing topic page so that developers can more easily learn about it.
To associate your repository with the threat-sharing topic, visit your repo's landing page and select "manage topics."