threatcmd
Threat intel CLI
A command-line interface to query threat intelligence data from ThreatCrowd.org
Cli interface to threatcrowd.org
19 stars
4 watching
5 forks
Language: Go
last commit: over 7 years ago Related projects:
Repository | Description | Stars |
---|---|---|
jheise/threatcrowd_api | Provides an API wrapper around ThreatCrowd's threat intelligence service | 9 |
davidonzo/threat-intel | Develops and shares cyber threat intelligence information in various formats for SOC/CSIRT/CERT use. | 148 |
mitre/cti | A repository providing threat intelligence data in STIX format for security analysis and automation | 1,749 |
ch33r10/bluespace2021 | A collection of resources and training materials focused on threat hunting and cyber-threat intelligence. | 13 |
fr0gger/yeti | An open-source platform designed to collect, organize, and provide insights on threat intelligence data | 1 |
yelp/threat_intel | Provides APIs for threat intelligence data from Umbrella Investigate and other sources | 274 |
intelowlproject/intelowl | A tool for managing and analyzing threat intelligence data at scale. | 3,842 |
miladaslaner/threathunt | A PowerShell repository to simulate and train threat hunting skills without malicious files. | 134 |
fhightower/ioc-finder | An interactive tool for extracting and parsing threat intelligence data from text | 158 |
opensourcesec/forager | A tool for gathering and managing threat intelligence data from various feeds. | 171 |
yeti-platform/yeti | A platform for integrating and searching threat intelligence data from various sources in a unified manner. | 1,745 |
certtools/intelmq-feeds-documentation | Provides a list of feeds for collecting threat intelligence data from various sources | 64 |
cred-club/artif | An advanced threat intelligence framework that integrates real-time IP reputation and historical data analysis to identify malicious traffic | 236 |
datadog/threatest | Tools for testing and verifying threat detection rules | 319 |
securityscorecard/ssc-threat-intel-iocs | Provides threat intelligence data, including IoCs, to support security research and analysis. | 71 |