CIFv2 is Entering End of Life CIFv2 was developed around Ubuntu14. CIFv3 has been developed against Ubuntu16. If you're just starting out, you should be test driving CIFv3: https://github.com/csirtgadgets/bearded-avenger-deploymentkit Getting Started the EasyButton! the Wiki FAQ Known Issues Getting Involved There are many ways to get involved with the project. If you have a new and exciting feature, or even a simple bugfix, simply fork the repo, create some simple test cases, generate a pull-request and give yourself credit! If you've never worked on a GitHub project, this is a good piece for getting started. How To Contribute Mailing List Project Page COPYRIGHT AND LICENCE Free use of this software is granted under the terms of the GNU Lesser General Public License (LGPLv3). For details see the files COPYING included with the distribution.
FEATURES
ALTERNATIVES
A StalkPhish Project YARA repository for Phishing Kits zip files.
Forager is a threat intelligence tool that simplifies the retrieval, storage, and maintenance of threat data with a user-friendly interface and support for various data sources.
Container of 200 Windows EVTX samples for testing detection scripts and training on DFIR.
Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.
A free and open-source OSINT framework for gathering and analyzing data from various sources
A tool for fetching and visualizing cyber threat intelligence data with Elasticsearch and Kibana integration.
Official repository of YARA rules for threat detection and hunting
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.