IntelMQ is a solution for IT security teams (CERTs & CSIRTs, SOCs abuse departments, etc.) for collecting and processing security feeds (such as log files) using a message queuing protocol. It's a community driven initiative called IHAP1 (Incident Handling Automation Project) which was conceptually designed by European CERTs/CSIRTs during several InfoSec events. Its main goal is to give to incident responders an easy way to collect & process threat intelligence thus improving the incident handling processes of CERTs. IntelMQ is frequently used for: automated incident handling situational awareness automated notifications as data collector for other tools and more! The design was influenced by AbuseHelper however it was re-written from scratch and aims at: Reducing the complexity of system administration Reducing the complexity of writing new bots for new data feeds Reducing the probability of events lost in all process with persistence functionality (even system crash) Use and improve the existing Data Harmonization Ontology Use JSON format for all messages Provide easy way to store data into databases and log collectors such as PostgreSQL, Elasticsearch and Splunk Pro
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A database of Tor exit nodes with their corresponding IP addresses and timestamps.
A collection of tools and resources for threat hunters.
Automatically create yara rules based on images embedded in office documents.
ZoomEye is an advanced cyberspace search engine that provides detailed information on cyberspace assets, including server software and version information, for cybersecurity experts, researchers, and enterprises.
Unified repository for Microsoft Sentinel and Microsoft 365 Defender containing security content, detections, queries, playbooks, and resources to secure environments and hunt for threats.
Scan files with Yara, match findings to VirusTotal comments.