Unfetter Logo

Unfetter

0
Free
Visit Website

This reference implementation provides a framework for collecting events from a client machine and performing CAR analytics to detect potential adversary activity. It uses three different systems to work: the analytic system, based on an ELK stack with Apache Spark; the data ingestion system, which collects events from the client machine; and the analytics system, which performs CAR analytics. Please see our webpage for more details: https://www.unfetter.io.

FEATURES

ALTERNATIVES

A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.

Check the reputation of an IP address to identify potential threats.

Maltiverse automates Threat Intelligence for small and medium-sized SecOps teams, providing an effective and affordable service.

A tracker that detects and logs SYN packets with a specific signature generated by the Mirai malware, providing real-time information on Mirai-based campaigns.

A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.

Amazon GuardDuty is a threat detection service for AWS accounts.

Public access to Indicators of Compromise (IoCs) and other data for readers of Security Scorecard's technical blog posts and reports.

An extendable tool to extract and aggregate IOCs from threat feeds, integrates with ThreatKB and MISP.

PINNED