An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
-
Updated
Jan 16, 2023
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
Collection of Suricata rule sets that I use modified to my environments.
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Detection & Hunting.
Threat Response Serverless Relay Template
Threat Response Serverless Relay for urlscan.io
Threat Response Serverless Relay for Have I Been Pwned
Example scripts for authenticating to the Threat Response APIs
Threat Response Serverless Relay for Akamai
Threat Response Serverless Relay for AlienVault OTX
Threat Response Serverless Relay for SecurityTrails
Add a description, image, and links to the threat-response topic page so that developers can more easily learn about it.
To associate your repository with the threat-response topic, visit your repo's landing page and select "manage topics."