Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.
The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs). GOSINT allows a security analyst to collect and standardize structured and unstructured threat intelligence. Applying threat intelligence to security operations enriches alert data with additional confidence, context, and co-occurrence. This means that you apply research from third parties to security event data to identify similar, or identical, indicators of malicious behavior. The framework is written in Go with a JavaScript frontend. Installation: Please find the installation procedure at http://gosint.readthedocs.io/en/latest/installation.html. There are three ways to get up and running: Bash install script, Docker, Manual installation. Updates: Updating is simple and encouraged as bugs are reported and fixed or new features are added. To update your instance of GOSINT, pull the latest version of GOSINT from the repository and re-run the build command to compile the updated binary: godep go build -o gosint. Configuration: GOSINT needs some quick initial configuration to start making use of it.
Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.
A system for collecting, managing, and distributing security information on a large scale, developed by CERT Polska.
A comprehensive list of IP addresses for cybersecurity purposes, including threat intelligence, incident response, and security research.
A collection of APT and cybercriminals campaigns with various resources and references.
A PowerShell script to interact with the MITRE ATT&CK Framework via its own API using the deprecated MediaWiki API.
A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.