mirror of
https://github.com/hslatman/awesome-threat-intelligence.git
synced 2024-12-18 18:36:11 +00:00
Update README.md
change position
This commit is contained in:
parent
be0e958935
commit
8bc781dcc1
48
README.md
48
README.md
@ -324,6 +324,14 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
|||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<a href="https://support.kaspersky.com/datafeeds" target="_blank">Kaspersky Threat Data Feeds</a>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
Continuously updated and inform your business or clients about risks and implications associated with cyber threats. The real-time data helps you to mitigate threats more effectively and defend against attacks even before they are launched. Demo Data Feeds contain truncated sets of IoCs (up to 1%) compared to the commercial ones
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://majestic.com/reports/majestic-million" target="_blank">Majestic Million</a>
|
<a href="https://majestic.com/reports/majestic-million" target="_blank">Majestic Million</a>
|
||||||
@ -584,14 +592,6 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
|||||||
Mrlooquer has created the first threat feed focused on systems with dual stack. Since IPv6 protocol has begun to be part of malware and fraud communications, It is necessary to detect and mitigate the threats in both protocols (IPv4 and IPv6).
|
Mrlooquer has created the first threat feed focused on systems with dual stack. Since IPv6 protocol has begun to be part of malware and fraud communications, It is necessary to detect and mitigate the threats in both protocols (IPv4 and IPv6).
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
|
||||||
<td>
|
|
||||||
<a href="https://support.kaspersky.com/datafeeds" target="_blank">Kaspersky Threat Data Feeds</a>
|
|
||||||
</td>
|
|
||||||
<td>
|
|
||||||
Continuously updated and inform your business or clients about risks and implications associated with cyber threats. The real-time data helps you to mitigate threats more effectively and defend against attacks even before they are launched. Demo Data Feeds contain truncated sets of IoCs (up to 1%) compared to the commercial ones
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
## Formats
|
## Formats
|
||||||
@ -777,6 +777,14 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari
|
|||||||
Interflow is currently in private preview.
|
Interflow is currently in private preview.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<a href="https://www.kaspersky.com/enterprise-security/threat-intelligence" target="_blank">Kaspersky Threat Intelligence Portal</a>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
A website that provides a knowledge base describing cyber threats, legitimate objects, and their relationships, brought together into a single web service. Subscribing to Kaspersky Lab’s Threat Intelligence Portal provides you with a single point of entry to four complementary services: Kaspersky Threat Data Feeds, Threat Intelligence Reporting, Kaspersky Threat Lookup and Kaspersky Research Sandbox, all available in human-readable and machine-readable formats.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://github.com/byt3smith/malstrom" target="_blank">Malstrom</a>
|
<a href="https://github.com/byt3smith/malstrom" target="_blank">Malstrom</a>
|
||||||
@ -1012,14 +1020,6 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari
|
|||||||
The open, distributed, machine and analyst-friendly threat intelligence repository. Made by and for incident responders.
|
The open, distributed, machine and analyst-friendly threat intelligence repository. Made by and for incident responders.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
|
||||||
<td>
|
|
||||||
<a href="https://www.kaspersky.com/enterprise-security/threat-intelligence" target="_blank">Kaspersky Threat Intelligence Portal</a>
|
|
||||||
</td>
|
|
||||||
<td>
|
|
||||||
A website that provides a knowledge base describing cyber threats, legitimate objects, and their relationships, brought together into a single web service. Subscribing to Kaspersky Lab’s Threat Intelligence Portal provides you with a single point of entry to four complementary services: Kaspersky Threat Data Feeds, Threat Intelligence Reporting, Kaspersky Threat Lookup and Kaspersky Research Sandbox, all available in human-readable and machine-readable formats.
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
|
||||||
@ -1270,6 +1270,14 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly
|
|||||||
Jager is a tool for pulling useful IOCs (indicators of compromise) out of various input sources (PDFs for now, plain text really soon, webpages eventually) and putting them into an easy to manipulate JSON format.
|
Jager is a tool for pulling useful IOCs (indicators of compromise) out of various input sources (PDFs for now, plain text really soon, webpages eventually) and putting them into an easy to manipulate JSON format.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>
|
||||||
|
<a href="https://support.kaspersky.com/13850" target="_blank">Kaspersky CyberTrace</a>
|
||||||
|
</td>
|
||||||
|
<td>
|
||||||
|
Threat intelligence fusion and analysis tool that integrates threat data feeds with SIEM solutions. Users can immediately leverage threat intelligence for security monitoring and incident report (IR) activities in the workflow of their existing security operations.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://github.com/KasperskyLab/klara" target="_blank">KLara</a>
|
<a href="https://github.com/KasperskyLab/klara" target="_blank">KLara</a>
|
||||||
@ -1551,14 +1559,6 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly
|
|||||||
Threat hunter based on osquery, Salt Open and Cymon API. It can query open network sockets and check them against threat intelligence sources
|
Threat hunter based on osquery, Salt Open and Cymon API. It can query open network sockets and check them against threat intelligence sources
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
|
||||||
<td>
|
|
||||||
<a href="https://support.kaspersky.com/13850" target="_blank">Kaspersky CyberTrace</a>
|
|
||||||
</td>
|
|
||||||
<td>
|
|
||||||
Threat intelligence fusion and analysis tool that integrates threat data feeds with SIEM solutions. Users can immediately leverage threat intelligence for security monitoring and incident report (IR) activities in the workflow of their existing security operations.
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user