Getting Started: Do NOT try to install from the master repo. For installation instructions and various Unix distribution guides, use the DeploymentKit. Integrations: Several integrations, plugins, and extensions have been written to bridge CIFv3 with other tools. Getting Help: Visit the Wiki for known issues and FAQs. Getting Involved: Contribute by forking the repo, creating test cases, and generating pull requests. How To Contribute: Join the mailing list and visit the project page. COPYRIGHT AND LICENSE: Copyright (C) 2017 the CSIRT Gadgets Foundation. Free use of this software is granted under the terms of the Mozilla Public License (MPLv2).
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A project sharing malicious URLs used for malware distribution to help protect networks.
Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.
In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.
VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.
A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.