Threat intelligence collecter from twitter Streaming API.
-
Updated
Jan 16, 2018 - Shell
Threat intelligence collecter from twitter Streaming API.
The goal of Engaged Threat is to provide honeypot researchers the ability to hold the attention of an attacker or to induce the attacker to participate in some sort of increased activity.
Generate a CSV file containing possible malicious IP addresses using FireHOL's blocklist IP sets.
Following script ingests the Threat Intel Feeds from input url list. Current script can fetch domains and IP Addresses.
Dionaea Bistreams will fill up most VPS's in a couple of days unless the storage is 100 GB+ In order to over come this you can create a cron job with this bash script or run it manually.
This script automates the installation of Dionaea Honeypot
Adds an IP Address feed (CIDR) into Check Point Objects via a URL
MISP decaying models
Docker-MISP provides an easy way for deploying MISP instances with simple Docker images.
CobaltStrike TeamServer hunting script. Produced to identify poorly configured CobaltStrike TeamServers and catalog assocaited IOCs. Old Code. YMMV
Tweaked scripts for the deployment of Dionaea through MHN
This script will store the file count and directory size into a log file. This can also be sent to slack.
Simple Script to download all the Malware Bazaar daily batches
Bringing you the best of the worst files on the Internet.
Cyber Defense Plattform for security incident investigation enrichment and automatisation.
Automated Collection of Threat Intel Feeds
An ELK (Elastic, Logstask, Kibana) stack with TLS Certs for a simple deployment.
Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"
Add a description, image, and links to the threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the threat-intelligence topic, visit your repo's landing page and select "manage topics."