PyOTI
Python library for threat intelligence (by RH-ISAC)
gittyupsec.com
Rope in your GitHub Security (by cowboyhat-io)
PyOTI | gittyupsec.com | |
---|---|---|
3 | 1 | |
71 | 1 | |
- | - | |
2.0 | 10.0 | |
5 months ago | over 1 year ago | |
Python | Go | |
GNU General Public License v3.0 only | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
PyOTI
Posts with mentions or reviews of PyOTI.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-02-21.
-
Free/low cost threat sources/analysis services with generous quotas for API usage?
have a look at the services included in PyOTI - https://github.com/RH-ISAC/PyOTI
- PyOTI is a python library to easily query various threat intelligence related APIs.
- PyOTI - Python Open Threat Intelligence
gittyupsec.com
Posts with mentions or reviews of gittyupsec.com.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-02-21.
-
Free/low cost threat sources/analysis services with generous quotas for API usage?
It’s open source and you’re free to run your own instance of it (written in Go and currently working on a CLI) which shouldn’t be too hard to do and is what I’d recommend since an admin token is required due to GitHub API’s requirements around reading branch projections programmatically.