CIFv3 Logo

CIFv3

0
Free
Visit Website

CIFv2 is Entering End of Life CIFv2 was developed around Ubuntu14. CIFv3 has been developed against Ubuntu16. If you're just starting out, you should be test driving CIFv3: https://github.com/csirtgadgets/bearded-avenger-deploymentkit Getting Started the EasyButton! the Wiki FAQ Known Issues Getting Involved There are many ways to get involved with the project. If you have a new and exciting feature, or even a simple bugfix, simply fork the repo, create some simple test cases, generate a pull-request and give yourself credit! If you've never worked on a GitHub project, this is a good piece for getting started. How To Contribute Mailing List Project Page COPYRIGHT AND LICENCE Free use of this software is granted under the terms of the GNU Lesser General Public License (LGPLv3). For details see the files COPYING included with the distribution.

FEATURES

ALTERNATIVES

A Pythonic framework for automated threat modeling shifting left.

Analyze suspicious files, domains, IPs, and URLs to detect malware and other breaches, and share results with the security community.

Real-time, container-based file scanning system for threat hunting and incident response.

Check if an IP address was used as a Tor relay on a given date.

A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.

An open source threat intelligence platform for storing and managing cyber threat intelligence knowledge.

Tool for visualizing correspondences between YARA ruleset and samples

Threat intelligence platform providing real-time threat data and insights.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved