PyIOCe is an OpenIOC editor built using Python 2.7 and wxPython 3.0.0.0. There are many systems for storing complete threat intelligence, but OpenIOC excels at manipulating that data into a reduced and operationalized search method. This can be used to build IOCs that describe broad threat behavior such as persistence mechanisms or important forensic sources or it can be used to search for more narrowly identified threats during incident response to rapidly scope a compromise across large enterprise networks. This project is meant to expand ongoing efforts to broaden the use of OpenIOC with other systems such as Snort, GRR, Splunk, and Yara. Standalone binaries are available under /dist. Required Python Modules: wxPython, lxml. Features: - Almost entirely keyboard driven - Support for opening and editing OpenIOC 1.0 and 1.1 IOCs simultaneously (OpenIOC 1.0 support is MIR only using legacy MIR terms) - Indicator Term management - Parameter management - Preferences for default IOC version, default IOC context, and default IOC author - IOC Cloning - Revert IOC Changes to last saved - Cut/Copy/Paste & drag and drop for Indicator tree - Indicator Terms and Parameters definition
FEATURES
SIMILAR TOOLS
Python-based client for IBM XForce Exchange with an improved version available.
RogueApps is a collaborative repository documenting TTPs of malicious OIDC/OAuth 2.0 applications for cybersecurity research and awareness.
A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel
A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.
msticpy is a library for InfoSec investigation and hunting in Jupyter Notebooks with extensive functionality for log data analysis, threat intelligence enrichment, and visualization.
Sample detection rules and dashboards for Google Security Operations
Maltiverse automates Threat Intelligence for small and medium-sized SecOps teams, providing an effective and affordable service.
A threat intelligence platform that collects, analyzes, and operationalizes threat data from multiple sources to help organizations identify and respond to security threats.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.