mirror of
https://github.com/hslatman/awesome-threat-intelligence.git
synced 2024-12-24 13:25:28 +00:00
Merge branch 'master' into pe3zx-patch-2
This commit is contained in:
commit
7951f435a0
43
README.md
43
README.md
@ -77,12 +77,21 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
|
|
||||||
<a href="https://certstream.calidog.io/" target="_blank">CertStream</a>
|
<a href="https://certstream.calidog.io/" target="_blank">CertStream</a>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
Real-time certificate transparency log update stream. See SSL certificates as they're issued in real time.
|
Real-time certificate transparency log update stream. See SSL certificates as they're issued in real time.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<a href="http://www.ccssforum.org/malware-certificates.php" target="_blank">CCSS Forum Malware Certificates</a>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
The following is a list of digital certificates that have been reported by the forum as possibly being associated with malware to various certificate authorities. This information is intended to help prevent companies from using digital certificates to add legitimacy to malware and encourage prompt revocation of such certificates.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="http://cinsscore.com/list/ci-badguys.txt" target="_blank">CI Army List</a>
|
<a href="http://cinsscore.com/list/ci-badguys.txt" target="_blank">CI Army List</a>
|
||||||
@ -187,6 +196,14 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
|||||||
FraudGuard is a service designed to provide an easy way to validate usage by continuously collecting and analyzing real-time internet traffic.
|
FraudGuard is a service designed to provide an easy way to validate usage by continuously collecting and analyzing real-time internet traffic.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<a href="http://greynoise.io/" target="_blank">Grey Noise</a>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
Grey Noise is a system that collects and analyzes data on Internet-wide scanners.It collects data on benign scanners such as Shodan.io, as well as malicious actors like SSH and telnet worms.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="http://hailataxii.com/" target="_blank">Hail a TAXII</a>
|
<a href="http://hailataxii.com/" target="_blank">Hail a TAXII</a>
|
||||||
@ -551,6 +568,14 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari
|
|||||||
Malstrom aims to be a repository for threat tracking and forensic artifacts, but also stores YARA rules and notes for investigation.
|
Malstrom aims to be a repository for threat tracking and forensic artifacts, but also stores YARA rules and notes for investigation.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<a href="https://github.com/stratosphereips/Manati" target="_blank">ManaTI</a>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
The ManaTI project assists threat analyst by employing machine learning techniques that find new relationships and inferences automatically.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="http://django-mantis.readthedocs.io/en/latest/" target="_blank">MANTIS</a>
|
<a href="http://django-mantis.readthedocs.io/en/latest/" target="_blank">MANTIS</a>
|
||||||
@ -714,6 +739,14 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari
|
|||||||
The X-Force Exchange (XFE) by IBM XFE is a free SaaS product that you can use to search for threat intelligence information, collect your findings, and share your insights with other members of the XFE community.
|
The X-Force Exchange (XFE) by IBM XFE is a free SaaS product that you can use to search for threat intelligence information, collect your findings, and share your insights with other members of the XFE community.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<a href="https://yara.adlice.com/" target="_blank">Yara Share</a>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
Yara Share is an online Yara rule editor and sharing platform.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://yeti-platform.github.io/" target="_blank">Yeti</a>
|
<a href="https://yeti-platform.github.io/" target="_blank">Yeti</a>
|
||||||
@ -852,6 +885,14 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly
|
|||||||
The GOSINT framework is a free project used for collecting, processing, and exporting high quality public indicators of compromise (IOCs).
|
The GOSINT framework is a free project used for collecting, processing, and exporting high quality public indicators of compromise (IOCs).
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<a href="https://hashdd.com/" target="_blank">hashdd</a>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
A tool to lookup related information from crytographic hash value
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://github.com/exp0se/harbinger" target="_blank">Harbinger Threat Intelligence</a>
|
<a href="https://github.com/exp0se/harbinger" target="_blank">Harbinger Threat Intelligence</a>
|
||||||
@ -1316,7 +1357,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r
|
|||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="http://aisel.aisnet.org/wi2017/track08/paper/3/" target="_blank">Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives</a>
|
<a href="https://aisel.aisnet.org/wi2017/track08/paper/3/" target="_blank">Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives</a>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
A systematic study of 22 Threat Intelligence Sharing Platforms (TISP) surfacing eight key findings about the current state of threat intelligence usage, its definition and TISPs.
|
A systematic study of 22 Threat Intelligence Sharing Platforms (TISP) surfacing eight key findings about the current state of threat intelligence usage, its definition and TISPs.
|
||||||
|
Loading…
Reference in New Issue
Block a user