Getting Started: Do NOT try to install from the master repo. For installation instructions and various Unix distribution guides, use the DeploymentKit. Integrations: Several integrations, plugins, and extensions have been written to bridge CIFv3 with other tools. Getting Help: Visit the Wiki for known issues and FAQs. Getting Involved: Contribute by forking the repo, creating test cases, and generating pull requests. How To Contribute: Join the mailing list and visit the project page. COPYRIGHT AND LICENSE: Copyright (C) 2017 the CSIRT Gadgets Foundation. Free use of this software is granted under the terms of the Mozilla Public License (MPLv2).
FEATURES
ALTERNATIVES
A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.
A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.
Open-source initiative providing malicious and benign datasets to expedite data analysis and threat research.
Cisco Umbrella is a cloud security platform that offers protection against threats on the internet by blocking malicious activity.
A PowerShell script to interact with the MITRE ATT&CK Framework via its own API using the deprecated MediaWiki API.
A repository of freely usable Yara rules for detection systems, with automated error detection workflows.
A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
PINNED

InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Check Point CloudGuard WAF
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.

Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.