Extract and aggregate threat intelligence.
- Updated
Jan 31, 2024 - Python
Extract and aggregate threat intelligence.
本项目致力于收集网上公开来源的威胁情报,主要关注信誉类威胁情报(如IP/域名等),以及事件类威胁情报。
Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨
AI-Powered Security Feed in Real Time
Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.
🦅 Use fingerprinting to actively hunt for Command and Control servers on Shodan. Process threat feeds from Abuse.ch services to create a local database of C2 servers.
Automated threat intelligence collector built with Python and GitHub Actions — fetches recent IOCs from open sources, normalizes and enriches them (IP, URL, hash, CVE), and publishes ready-to-use feeds in CSV, JSON, and STIX formats.
Scrapes a list of Payload Domains, IOC's & C2 IPs from from various feeds for easy blacklisting.
Easily manage blocking any external threat across all your FortiGate firewalls within a minute.
Automatically created C2 Feeds for Fortigate
Automated phishing threat intelligence feed with URLs, IPs, domains, and IOC data.
Add a description, image, and links to the threat-feeds topic page so that developers can more easily learn about it.
To associate your repository with the threat-feeds topic, visit your repo's landing page and select "manage topics."