OSTrICa Logo

OSTrICa

0
Free
Visit Website

OSTrICa stands for Open Source Threat Intelligence Collector and is an Open Source plugin-oriented framework to collect and visualize Threat Intelligence Information. Furthermore, OSTrICa is also the Italian word for oyster: that's where the logo come from. SOC analysts, incident responders, attack investigators or cyber-security analysts need to correlate IoCs (Indicator of Compromise), network traffic patterns and any other collected data in order to get a real advantage against cyber-enemies. This is where threat intelligence comes into play, but unfortunately, not all the companies have enough budget to spend on Threat Intelligence Platform and Programs (TIPP); this is the main motivation behind OSTrICa's development. OSTrICa is a free and open source framework that allows everyone to automatically collect and visualize any sort of threat intelligence data harvested (IoCs), from open, internal and commercial sources using a plugin based architecture. The collected intelligence can be analyzed and used to enhance cybersecurity defenses.

FEATURES

ALTERNATIVES

Sigma is a generic and open signature format for SIEM systems and other security tools to detect and respond to threats.

Aggregates security threats from online sources and outputs to various formats.

Home for rules used by Elastic Security with code for unit testing, Kibana integration, and Red Team Automation.

Proof-of-concept implementation of TAXII services for developers and non-developers.

A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.

A tool to extract indicators of compromise from security reports in PDF format.

Repository of IOCs provided under the Apache 2.0 license

msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks with extensive functionality for log data analysis, threat intelligence enrichment, and visualization.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved