nyx
Threat Distributor
Automates distribution of threat intelligence artifacts to defensive systems.
Threat Intelligence distribution
30 stars
9 watching
7 forks
Language: Python
last commit: almost 9 years ago Related projects:
Repository | Description | Stars |
---|---|---|
pan-unit42/public_tools | A collection of tools and utilities released by the Palo Alto Networks Threat Intelligence team. | 709 |
jpsenior/threataggregator | Automates aggregation of security threat data from various online sources | 79 |
davidonzo/threat-intel | Develops and shares cyber threat intelligence information in various formats for SOC/CSIRT/CERT use. | 148 |
mlsecproject/combine | Tool to gather Threat Intelligence indicators from publicly available sources | 655 |
greynoise-intelligence/pygreynoise | An abstract Python library providing a command-line interface to interact with the GreyNoise threat intelligence service | 151 |
yelp/threat_intel | Provides APIs for threat intelligence data from Umbrella Investigate and other sources | 274 |
volexity/threat-intel | A repository of threat intelligence data from public Volexity blog posts. | 318 |
jheise/threatcrowd_api | Provides an API wrapper around ThreatCrowd's threat intelligence service | 9 |
owasp/pytm | Automates threat modeling and documentation for software systems. | 919 |
opensourcesec/forager | A tool for gathering and managing threat intelligence data from various feeds. | 171 |
ptr32void/ostrica | A framework to collect and visualize threat intelligence information from various sources in a flexible and plugin-based architecture. | 308 |
inquest/threatingestor | Extracts and aggregates threat intelligence from various sources | 831 |
fr0gger/yeti | An open-source platform designed to collect, organize, and provide insights on threat intelligence data | 1 |
threatconnect-inc/threatconnect-developer-docs | Documentation for ThreatConnect's API and SDKs for integrating with the platform | 8 |
kevthehermit/pastehunter | Automates scanning of publicly hosted pasted data against Yara rules to identify potential security or research threats. | 1,065 |