mirror of
https://github.com/hslatman/awesome-threat-intelligence.git
synced 2024-12-24 05:15:27 +00:00
Merge pull request #103 from pe3zx/pe3zx-patch-3
Add CCSS Forum Malware Certificates to README.md
This commit is contained in:
commit
20dca9d4f4
@ -4,4 +4,4 @@ rvm:
|
|||||||
before_script:
|
before_script:
|
||||||
- gem install awesome_bot
|
- gem install awesome_bot
|
||||||
script:
|
script:
|
||||||
- awesome_bot README.md --white-list CONTRIBUTING.md,https://www.threatcrowd.org/,https://intel.deepviz.com/recap_network.php,https://www.fireeye.com/services/freeware/ioc-editor.html,https://www.threatconnect.com/wp-content/uploads/ThreatConnect-The-Diamond-Model-of-Intrusion-Analysis.pdf,http://www.dtic.mil/dtic/tr/fulltext/u2/a547092.pdf,http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf,http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511,https://sslbl.abuse.ch/,https://soltra.com/,https://cryptome.org/2015/09/cti-guide.pdf,https://intel.criticalstack.com/,https://car.mitre.org/wiki/Main_Page,http://dx.doi.org/10.6028/NIST.SP.800-150,https://bitbucket.org/camp0/aiengine,https://www.abuse.ch/,https://www.recordedfuture.com/,https://isc.sans.edu/suspicious_domains.html,http://danger.rulez.sk/projects/bruteforceblocker/blist.php,https://intel.malwaretech.com
|
- awesome_bot README.md --white-list CONTRIBUTING.md,https://www.threatcrowd.org/,https://intel.deepviz.com/recap_network.php,https://www.fireeye.com/services/freeware/ioc-editor.html,https://www.threatconnect.com/wp-content/uploads/ThreatConnect-The-Diamond-Model-of-Intrusion-Analysis.pdf,http://www.dtic.mil/dtic/tr/fulltext/u2/a547092.pdf,http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf,http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511,https://sslbl.abuse.ch/,https://soltra.com/,https://cryptome.org/2015/09/cti-guide.pdf,https://intel.criticalstack.com/,https://car.mitre.org/wiki/Main_Page,http://dx.doi.org/10.6028/NIST.SP.800-150,https://bitbucket.org/camp0/aiengine,https://www.abuse.ch/,https://www.recordedfuture.com/,https://isc.sans.edu/suspicious_domains.html,http://danger.rulez.sk/projects/bruteforceblocker/blist.php,https://intel.malwaretech.com --allow-ssl --allow-redirect
|
||||||
|
18
README.md
18
README.md
@ -75,6 +75,14 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
|||||||
A feed of known, active and non-sinkholed C&C IP addresses, from Bambenek Consulting.
|
A feed of known, active and non-sinkholed C&C IP addresses, from Bambenek Consulting.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<a href="http://www.ccssforum.org/malware-certificates.php" target="_blank">CCSS Forum Malware Certificates</a>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
The following is a list of digital certificates that have been reported by the forum as possibly being associated with malware to various certificate authorities. This information is intended to help prevent companies from using digital certificates to add legitimacy to malware and encourage prompt revocation of such certificates.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="http://cinsscore.com/list/ci-badguys.txt" target="_blank">CI Army List</a>
|
<a href="http://cinsscore.com/list/ci-badguys.txt" target="_blank">CI Army List</a>
|
||||||
@ -586,7 +594,7 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="http://www.openioc.org/" target="_blank">OpenIOC</a>
|
<a href="https://www.fireeye.com/services/freeware.html" target="_blank">OpenIOC</a>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
OpenIOC is an open framework for sharing threat intelligence. It is designed to exchange threat information both internally and externally in a machine-digestible format.
|
OpenIOC is an open framework for sharing threat intelligence. It is designed to exchange threat information both internally and externally in a machine-digestible format.
|
||||||
@ -755,14 +763,6 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly
|
|||||||
AIEngine is a next generation interactive/programmable Python/Ruby/Java/Lua packet inspection engine with capabilities of learning without any human intervention, NIDS(Network Intrusion Detection System) functionality, DNS domain classification, network collector, network forensics and many others. Source available on <a href="https://bitbucket.org/camp0/aiengine" target="_blank">Bitbucket</a>.
|
AIEngine is a next generation interactive/programmable Python/Ruby/Java/Lua packet inspection engine with capabilities of learning without any human intervention, NIDS(Network Intrusion Detection System) functionality, DNS domain classification, network collector, network forensics and many others. Source available on <a href="https://bitbucket.org/camp0/aiengine" target="_blank">Bitbucket</a>.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
|
||||||
<td>
|
|
||||||
<a href="https://github.com/Animus-Intelligence/omni" target="_blank">Animus Omni CLI</a>
|
|
||||||
</td>
|
|
||||||
<td>
|
|
||||||
The Animus Omni CLI helps you separate the signal from the noise in your logfiles. Untargeted scans are flooding the internet, which will clog up your log files and make it hard to find legitimate events of interest. This utility leverages the Animus API to reduce noisy entries from your log files.
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://github.com/1aN0rmus/TekDefense-Automater" target="_blank">Automater</a>
|
<a href="https://github.com/1aN0rmus/TekDefense-Automater" target="_blank">Automater</a>
|
||||||
|
Loading…
Reference in New Issue
Block a user