AbuseHelper Logo

AbuseHelper

0
Free
Visit Website

AbuseHelper is an open-source framework for receiving and redistributing abuse feeds and threat intel. Running tests & linter We run automated tests (for Python 2.6, 2.7 and PyPy) and flake8 linter for each repository push. View the logs at https://circleci.com/gh/abusesa/abusehelper. To run the tests locally you need to have tox installed (for example via pip install tox). Then, while in the project directory, run: $ tox Changelog See CHANGELOG.md. Security Announcements AbuseHelper Security Announcement 2016-01. Summary: Multiple places failed to check X.509 certificates leading to possibility to MITM connections. Community extensions This project provides the core AbuseHelper functionality, including choice bots and tools. The AbuseHelper Community repository builds upon the core, for example by offering a fine selection of community-maintained bots. License Files are (c) respective copyright holders if named in the specific file, everything else is current (c) by Synopsys, Inc. Everything is licensed under MIT license, see LICENSE.

FEATURES

ALTERNATIVES

A tool for creating custom detection rules from YAML input

SecurityTrails API provides access to a vast repository of historical DNS lookups, WHOIS records, hostnames, and domains for cyber forensics and investigations.

In-depth analysis of real-world attacks and threat tactics

Platform providing community-driven threat intelligence on cyber threats with a focus on malware and botnets.

FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity

ONYPHE is a cyber defense search engine that discovers exposed assets and provides real-time monitoring to identify vulnerabilities and potential risks.

Taxii2 server for interacting with taxii services.

Stixview is a JS library for embeddable interactive STIX2 graphs, aiming to bridge the gap between CTI stories and structured CTI snapshots.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved