mirror of
https://github.com/hslatman/awesome-threat-intelligence.git
synced 2024-10-01 05:45:38 -04:00
Merge pull request #271 from KillrBunn3/removing-dead-links
broken link removal
This commit is contained in:
commit
796c80c054
18
README.md
18
README.md
@ -131,14 +131,6 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
|||||||
Cloudmersive Virus Scan APIs scan files, URLs, and cloud storage for viruses. They leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. The service is free, but requires you register for an account to retrieve your personal API key.
|
Cloudmersive Virus Scan APIs scan files, URLs, and cloud storage for viruses. They leverage continuously updated signatures for millions of threats, and advanced high-performance scanning capabilities. The service is free, but requires you register for an account to retrieve your personal API key.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
|
||||||
<td>
|
|
||||||
<a href="https://intelstack.com/" target="_blank">Critical Stack Intel</a>
|
|
||||||
</td>
|
|
||||||
<td>
|
|
||||||
The free threat intelligence parsed and aggregated by Critical Stack is ready for use in any Bro production system. You can specify which feeds you trust and want to ingest. Will soon be made unavailable and may become available on https://developer.capitalone.com/resources/open-source.
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://app.crowdsec.net/" target="_blank">CrowdSec Console</a>
|
<a href="https://app.crowdsec.net/" target="_blank">CrowdSec Console</a>
|
||||||
@ -275,14 +267,6 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
|
|||||||
GreyNoise collects and analyzes data on Internet-wide scanning activity. It collects data on benign scanners such as Shodan.io, as well as malicious actors like SSH and telnet worms.
|
GreyNoise collects and analyzes data on Internet-wide scanning activity. It collects data on benign scanners such as Shodan.io, as well as malicious actors like SSH and telnet worms.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
|
||||||
<td>
|
|
||||||
<a href="http://hailataxii.com/" target="_blank">Hail a TAXII</a>
|
|
||||||
</td>
|
|
||||||
<td>
|
|
||||||
Hail a TAXII.com is a repository of Open Source Cyber Threat Intelligence feeds in STIX format. They offer several feeds, including some that are listed here already in a different format, like the Emerging Threats rules and PhishTank feeds.
|
|
||||||
</td>
|
|
||||||
</tr>
|
|
||||||
<tr>
|
<tr>
|
||||||
<td>
|
<td>
|
||||||
<a href="https://honeydb.io/" target="_blank">HoneyDB</a>
|
<a href="https://honeydb.io/" target="_blank">HoneyDB</a>
|
||||||
@ -436,7 +420,7 @@ The primary goal of Malpedia is to provide a resource for rapid identification a
|
|||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td><a href="http://data.netlab.360.com/">Netlab OpenData Project</a>
|
<td><a href="https://blog.netlab.360.com/tag/english/">Netlab OpenData Project</a>
|
||||||
</td>
|
</td>
|
||||||
<td>
|
<td>
|
||||||
The Netlab OpenData project was presented to the public first at ISC' 2016 on August 16, 2016. We currently provide multiple data feeds, including DGA, EK, MalCon, Mirai C2, Mirai-Scanner, Hajime-Scanner and DRDoS Reflector.
|
The Netlab OpenData project was presented to the public first at ISC' 2016 on August 16, 2016. We currently provide multiple data feeds, including DGA, EK, MalCon, Mirai C2, Mirai-Scanner, Hajime-Scanner and DRDoS Reflector.
|
||||||
|
Loading…
Reference in New Issue
Block a user