Watcher
Threat Hunter
Automated platform for discovering and analyzing cybersecurity threats targeting an organization
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
869 stars
39 watching
126 forks
Language: Python
last commit: 11 months ago certificate-transparencycertstreamcybersecuritydjangoincident-responsemispmonitoringnltkosintosint-pythonphishingreactjsrss-bridgesecuritythehivethreat-detectionthreat-huntingthreat-intelligencewatcherwebapp
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A collection of tools and resources for threat hunters to identify and respond to cyber threats. | 861 |
| | Automated system for detecting suspicious TLS certificate issuances | 1,717 |
| | A tool for hunting and tracking Internet of Things (IoT) security threats by collecting and analyzing indicators of compromise (IOCs) | 116 |
| | A language and runtime framework for building reusable, composable threat hunting workflows using Python. | 302 |
| | Monitors and alerts on IOCs from Google Custom Search Engines and Safe Browsing APIs. | 66 |
| | Provides a RESTful API to monitor the health and status of backing services such as databases and caches. | 541 |
| | Tool to compare IP addresses or hostnames to threat intelligence feeds and detect potential security threats. | 138 |
| | An instrument used to hunt and identify cross-site scripting (XSS) vulnerabilities by tracking correlated requests and payloads. | 250 |
| | Tools and rules for detecting malicious domain calls in endpoint malware | 570 |
| | Collects and analyzes indicators of malicious targeting of civil society organizations. | 188 |
| | A tool that detects phishing sites in real-time by analyzing certificate transparency logs and regular expressions. | 81 |
| | Automates scanning of publicly hosted pasted data against Yara rules to identify potential security or research threats. | 1,069 |
| | Tools for extracting and analyzing threat indicators from various data sources | 84 |
| | A system to collect and manage security information on a large scale. | 124 |
| | Automates aggregation of security threat data from various online sources | 80 |