Unfetter Logo

Unfetter

0
Free
Visit Website

This reference implementation provides a framework for collecting events from a client machine and performing CAR analytics to detect potential adversary activity. It uses three different systems to work: the analytic system, based on an ELK stack with Apache Spark; the data ingestion system, which collects events from the client machine; and the analytics system, which performs CAR analytics. Please see our webpage for more details: https://www.unfetter.io.

FEATURES

ALTERNATIVES

Open Source Intelligence solution for threat intelligence data enrichment and quick analysis of suspicious files or malware.

Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.

Real-time, container-based file scanning system for threat hunting and incident response.

Daily feed of bad IPs with blacklist hit scores for cybersecurity professionals to stay informed about malicious IP addresses.

TIH is an intelligence tool that helps you search for IOCs across multiple security feeds and APIs.

Aggregates security threats from online sources and outputs to various formats.

A repository of cybersecurity datasets and tools curated by @sooshie.

A collection of companies that disclose adversary TTPs after being breached, useful for analysis of intrusions.