CIFv2 is Entering End of Life CIFv2 was developed around Ubuntu14. CIFv3 has been developed against Ubuntu16. If you're just starting out, you should be test driving CIFv3: https://github.com/csirtgadgets/bearded-avenger-deploymentkit Getting Started the EasyButton! the Wiki FAQ Known Issues Getting Involved There are many ways to get involved with the project. If you have a new and exciting feature, or even a simple bugfix, simply fork the repo, create some simple test cases, generate a pull-request and give yourself credit! If you've never worked on a GitHub project, this is a good piece for getting started. How To Contribute Mailing List Project Page COPYRIGHT AND LICENCE Free use of this software is granted under the terms of the GNU Lesser General Public License (LGPLv3). For details see the files COPYING included with the distribution.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
MaxMind provides accurate IP geolocation and online fraud detection solutions to create safer digital experiences.
A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.
IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol, with a focus on incident handling automation and threat intelligence processing.
A framework for managing cyber threat intelligence in structured formats.
Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.
Repository for detection content with various types of rules and payloads.
A set of rules for detecting threats in various formats, including Snort, Yara, ClamAV, and HXIOC.
Public access to Indicators of Compromise (IoCs) and other data for readers of Security Scorecard's technical blog posts and reports.
Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.