CIFv2 is Entering End of Life CIFv2 was developed around Ubuntu14. CIFv3 has been developed against Ubuntu16. If you're just starting out, you should be test driving CIFv3: https://github.com/csirtgadgets/bearded-avenger-deploymentkit Getting Started the EasyButton! the Wiki FAQ Known Issues Getting Involved There are many ways to get involved with the project. If you have a new and exciting feature, or even a simple bugfix, simply fork the repo, create some simple test cases, generate a pull-request and give yourself credit! If you've never worked on a GitHub project, this is a good piece for getting started. How To Contribute Mailing List Project Page COPYRIGHT AND LICENCE Free use of this software is granted under the terms of the GNU Lesser General Public License (LGPLv3). For details see the files COPYING included with the distribution.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.
An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.
Search engine for Windows executable files and hashes, providing insights into file prevalence, behavior, and security information.
In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.
FraudGuard is a service that provides real-time internet traffic analysis and IP tracking to help validate usage and prevent fraud.
VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.
A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.
A tracker that detects and logs SYN packets with a specific signature generated by the Mirai malware, providing real-time information on Mirai-based campaigns.
A project sharing malicious URLs used for malware distribution to help protect networks.