This reference implementation provides a framework for collecting events from a client machine and performing CAR analytics to detect potential adversary activity. It uses three different systems to work: the analytic system, based on an ELK stack with Apache Spark; the data ingestion system, which collects events from the client machine; and the analytics system, which performs CAR analytics. Please see our webpage for more details: https://www.unfetter.io.
FEATURES
ALTERNATIVES
Knowledge base workflow management dashboard for YARA rules and C2 artifacts.
A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.
Maltego transform pack for analyzing and graphing Honeypots using MySQL data.
Forager is a threat intelligence tool that simplifies the retrieval, storage, and maintenance of threat data with a user-friendly interface and support for various data sources.
Real-time, container-based file scanning system for threat hunting and incident response.
A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.
Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.
In-depth analysis of real-world attacks and threat tactics
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

OSINTLeak
OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.