threataggregator
Threat Aggregator
Automates aggregation of security threat data from various online sources
Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc.
79 stars
12 watching
27 forks
Language: Python
last commit: almost 9 years ago
Linked from 2 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
inquest/threatingestor | Extracts and aggregates threat intelligence from various sources | 831 |
paulpc/nyx | Automates distribution of threat intelligence artifacts to defensive systems. | 30 |
threatexpress/persistence-aggressor-script | A tool for creating and managing persistent malware components that can operate in multiple listener scenarios, including local and foreign listeners. | 42 |
mlsecproject/combine | Tool to gather Threat Intelligence indicators from publicly available sources | 655 |
misp/misp-maltego | An integration tool for Maltego to leverage MISP threat intelligence and the MITRE ATT&CK dataset | 170 |
kevthehermit/pastehunter | Automates scanning of publicly hosted pasted data against Yara rules to identify potential security or research threats. | 1,065 |
a3sal0n/cyberthreathunting | A collection of tools and resources for threat hunters to identify and respond to cyber threats. | 855 |
sroberts/jager | Tools for extracting and analyzing threat indicators from various data sources | 82 |
opencybersecurityalliance/kestrel-lang | A language and runtime framework for building reusable, composable threat hunting workflows using Python. | 300 |
michael-yip/threattracker | Monitors and alerts on IOCs from Google Custom Search Engines and Safe Browsing APIs. | 66 |
fhightower/ioc-finder | An interactive tool for extracting and parsing threat intelligence data from text | 158 |
sk4la/plast | A modular threat-hunting tool framework for detecting indicators of compromise in incident-response operations. | 17 |
aboutsecurity/rastrea2r | A tool for hunting and tracking Internet of Things (IoT) security threats by collecting and analyzing indicators of compromise (IOCs) | 116 |
botherder/targetedthreats | Collects and analyzes indicators of malicious targeting of civil society organizations. | 188 |
svdwi/bluebox | Analyzes and enriches threat intelligence data from various sources to help detect malicious files, URLs, and domains. | 38 |