Merge pull request #243 from hslatman/herman/some-cleanup-20221008

Cleanup 2022-10-08 part 1
This commit is contained in:
Herman Slatman 2022-10-10 23:51:51 +02:00 committed by GitHub
commit 56cbbfedd6
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
3 changed files with 4 additions and 8 deletions

View File

@ -85,7 +85,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
</tr> </tr>
<tr> <tr>
<td> <td>
<a href="http://danger.rulez.sk/projects/bruteforceblocker/" target="_blank">BruteForceBlocker</a> <a href="https://danger.rulez.sk/index.php/bruteforceblocker/download/" target="_blank">BruteForceBlocker</a>
</td> </td>
<td> <td>
BruteForceBlocker is a perl script that monitors a server's sshd logs and identifies brute force attacks, which it then uses to automatically configure firewall blocking rules and submit those IPs back to the project site, <a href="http://danger.rulez.sk/projects/bruteforceblocker/blist.php">http://danger.rulez.sk/projects/bruteforceblocker/blist.php</a>. BruteForceBlocker is a perl script that monitors a server's sshd logs and identifies brute force attacks, which it then uses to automatically configure firewall blocking rules and submit those IPs back to the project site, <a href="http://danger.rulez.sk/projects/bruteforceblocker/blist.php">http://danger.rulez.sk/projects/bruteforceblocker/blist.php</a>.
@ -285,7 +285,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
</tr> </tr>
<tr> <tr>
<td> <td>
<a href="https://riskdiscovery.com/honeydb/" target="_blank">HoneyDB</a> <a href="https://honeydb.io/" target="_blank">HoneyDB</a>
</td> </td>
<td> <td>
HoneyDB provides real time data of honeypot activity. This data comes from honeypots deployed on the Internet using the <a href="https://github.com/foospidy/HoneyPy" target="_blank">HoneyPy</a> honeypot. In addition, HoneyDB provides API access to collected honeypot activity, which also includes aggregated data from various honeypot Twitter feeds. HoneyDB provides real time data of honeypot activity. This data comes from honeypots deployed on the Internet using the <a href="https://github.com/foospidy/HoneyPy" target="_blank">HoneyPy</a> honeypot. In addition, HoneyDB provides API access to collected honeypot activity, which also includes aggregated data from various honeypot Twitter feeds.
@ -355,10 +355,6 @@ Continuously updated and inform your business or clients about risks and implica
Probable Whitelist of the top 1 million web sites, as ranked by Majestic. Sites are ordered by the number of referring subnets. More about the ranking can be found on their <a href="https://blog.majestic.com/development/majestic-million-csv-daily/" target="_blank">blog</a>. Probable Whitelist of the top 1 million web sites, as ranked by Majestic. Sites are ordered by the number of referring subnets. More about the ranking can be found on their <a href="https://blog.majestic.com/development/majestic-million-csv-daily/" target="_blank">blog</a>.
</td> </td>
</tr> </tr>
<tr>
<td><a href="http://malc0de.com/bl/">Malc0de DNS Sinkhole</a></td>
<td>The files in this link will be updated daily with domains that have been indentified distributing malware during the past 30 days. Collected by malc0de.</td>
</tr>
<tr> <tr>
<td> <td>
<a href="https://maldatabase.com/" target="_blank">Maldatabase</a> <a href="https://maldatabase.com/" target="_blank">Maldatabase</a>
@ -1900,7 +1896,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r
</tr> </tr>
<tr> <tr>
<td> <td>
<a href="https://www.mwrinfosecurity.com/assets/Whitepapers/Threat-Intelligence-Whitepaper.pdf" target="_blank">Threat Intelligence: Collecting, Analysing, Evaluating</a> <a href="./docs/mwr-threat-intelligence-whitepaper.pdf" target="_blank">Threat Intelligence: Collecting, Analysing, Evaluating</a>
</td> </td>
<td> <td>
This report by MWR InfoSecurity clearly describes several different types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity. This report by MWR InfoSecurity clearly describes several different types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity.
@ -1932,7 +1928,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r
</tr> </tr>
<tr> <tr>
<td> <td>
<a href="https://www.sans.org/reading-room/whitepapers/analyst/who-039-s-cyberthreat-intelligence-how-35767" target="_blank">Who's Using Cyberthreat Intelligence and How?</a> <a href="docs/sans-whos-using-cyberthreat-intelligence-and-how.pdf" target="_blank">Who's Using Cyberthreat Intelligence and How?</a>
</td> </td>
<td> <td>
A whitepaper by the SANS Institute describing the usage of Threat Intelligence including a survey that was performed. A whitepaper by the SANS Institute describing the usage of Threat Intelligence including a survey that was performed.

Binary file not shown.