ThreatIngestor
uzen
ThreatIngestor | uzen | |
---|---|---|
1 | 2 | |
786 | 88 | |
1.9% | - | |
7.6 | 0.0 | |
3 months ago | 9 months ago | |
Python | Python | |
GNU General Public License v3.0 only | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ThreatIngestor
uzen
What are some alternatives?
C2IntelFeeds - Automatically created C2 Feeds
pyppeteer - Headless chrome/chromium automation library (unofficial port of puppeteer)
sysmon-config - Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.
strelka - Real-time, container-based file scanning at enterprise scale
YaraHunter - 🔍🔍 Malware scanner for cloud-native, as part of CI/CD and at Runtime 🔍🔍
yarGen - yarGen is a generator for YARA rules
harpoon
iocextract - Defanged Indicator of Compromise (IOC) Extractor.
misp-warninglists - Warning lists to inform users of MISP about potential false-positives or other information in indicators
Loki - Loki - Simple IOC and YARA Scanner
StalkPhish - StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
headless-chrome-github-action - Github action to run test cases using Selenium