mirror of
https://github.com/hslatman/awesome-threat-intelligence.git
synced 2024-10-01 05:45:38 -04:00
Merge pull request #243 from hslatman/herman/some-cleanup-20221008
Cleanup 2022-10-08 part 1
This commit is contained in:
commit
56cbbfedd6
12
README.md
12
README.md
@ -85,7 +85,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="http://danger.rulez.sk/projects/bruteforceblocker/" target="_blank">BruteForceBlocker</a>
|
||||
<a href="https://danger.rulez.sk/index.php/bruteforceblocker/download/" target="_blank">BruteForceBlocker</a>
|
||||
</td>
|
||||
<td>
|
||||
BruteForceBlocker is a perl script that monitors a server's sshd logs and identifies brute force attacks, which it then uses to automatically configure firewall blocking rules and submit those IPs back to the project site, <a href="http://danger.rulez.sk/projects/bruteforceblocker/blist.php">http://danger.rulez.sk/projects/bruteforceblocker/blist.php</a>.
|
||||
@ -285,7 +285,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://riskdiscovery.com/honeydb/" target="_blank">HoneyDB</a>
|
||||
<a href="https://honeydb.io/" target="_blank">HoneyDB</a>
|
||||
</td>
|
||||
<td>
|
||||
HoneyDB provides real time data of honeypot activity. This data comes from honeypots deployed on the Internet using the <a href="https://github.com/foospidy/HoneyPy" target="_blank">HoneyPy</a> honeypot. In addition, HoneyDB provides API access to collected honeypot activity, which also includes aggregated data from various honeypot Twitter feeds.
|
||||
@ -355,10 +355,6 @@ Continuously updated and inform your business or clients about risks and implica
|
||||
Probable Whitelist of the top 1 million web sites, as ranked by Majestic. Sites are ordered by the number of referring subnets. More about the ranking can be found on their <a href="https://blog.majestic.com/development/majestic-million-csv-daily/" target="_blank">blog</a>.
|
||||
</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><a href="http://malc0de.com/bl/">Malc0de DNS Sinkhole</a></td>
|
||||
<td>The files in this link will be updated daily with domains that have been indentified distributing malware during the past 30 days. Collected by malc0de.</td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://maldatabase.com/" target="_blank">Maldatabase</a>
|
||||
@ -1900,7 +1896,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://www.mwrinfosecurity.com/assets/Whitepapers/Threat-Intelligence-Whitepaper.pdf" target="_blank">Threat Intelligence: Collecting, Analysing, Evaluating</a>
|
||||
<a href="./docs/mwr-threat-intelligence-whitepaper.pdf" target="_blank">Threat Intelligence: Collecting, Analysing, Evaluating</a>
|
||||
</td>
|
||||
<td>
|
||||
This report by MWR InfoSecurity clearly describes several different types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity.
|
||||
@ -1932,7 +1928,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r
|
||||
</tr>
|
||||
<tr>
|
||||
<td>
|
||||
<a href="https://www.sans.org/reading-room/whitepapers/analyst/who-039-s-cyberthreat-intelligence-how-35767" target="_blank">Who's Using Cyberthreat Intelligence and How?</a>
|
||||
<a href="docs/sans-whos-using-cyberthreat-intelligence-and-how.pdf" target="_blank">Who's Using Cyberthreat Intelligence and How?</a>
|
||||
</td>
|
||||
<td>
|
||||
A whitepaper by the SANS Institute describing the usage of Threat Intelligence including a survey that was performed.
|
||||
|
BIN
docs/mwr-threat-intelligence-whitepaper.pdf
Normal file
BIN
docs/mwr-threat-intelligence-whitepaper.pdf
Normal file
Binary file not shown.
BIN
docs/sans-whos-using-cyberthreat-intelligence-and-how.pdf
Normal file
BIN
docs/sans-whos-using-cyberthreat-intelligence-and-how.pdf
Normal file
Binary file not shown.
Loading…
Reference in New Issue
Block a user