Unfetter Logo

Unfetter

0
Free
Visit Website

This reference implementation provides a framework for collecting events from a client machine and performing CAR analytics to detect potential adversary activity. It uses three different systems to work: the analytic system, based on an ELK stack with Apache Spark; the data ingestion system, which collects events from the client machine; and the analytics system, which performs CAR analytics. Please see our webpage for more details: https://www.unfetter.io.

FEATURES

ALTERNATIVES

Knowledge base workflow management dashboard for YARA rules and C2 artifacts.

A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.

Maltego transform pack for analyzing and graphing Honeypots using MySQL data.

Forager is a threat intelligence tool that simplifies the retrieval, storage, and maintenance of threat data with a user-friendly interface and support for various data sources.

Real-time, container-based file scanning system for threat hunting and incident response.

A free threat intelligence feed and banlist feed of known malicious IP addresses for public use only.

Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.

In-depth analysis of real-world attacks and threat tactics