{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"intelmq","owner":"CERT-Bund","isFork":true,"description":"IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":295,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-06T09:48:51.341Z"}},{"type":"Public","name":"IRNetTools","owner":"CERT-Bund","isFork":false,"description":"Incident Response Network Tools","allTopics":["incident-response","cert","csirt","network-tools","ip-address-geolocation","ip-address-lookup","automated-processing","incident-handling"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":22,"forksCount":2,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-07-23T12:11:01.557Z"}},{"type":"Public","name":"malware_name_mapping","owner":"CERT-Bund","isFork":true,"description":"A mapping of used malware names to commonly known family names","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":14,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-10-10T12:03:05.598Z"}},{"type":"Public","name":"intelmq-manager","owner":"CERT-Bund","isFork":true,"description":"IntelMQ Manager is a graphical interface to manage configurations for IntelMQ framework.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":55,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-01-18T14:51:19.009Z"}},{"type":"Public","name":"Reference-Security-Incident-Taxonomy-Task-Force","owner":"CERT-Bund","isFork":true,"description":"The aim of this task force is to enable the CSIRT community in reaching a consensus on a reference taxonomy.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":33,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-11-20T13:56:59.900Z"}},{"type":"Public","name":"Applied-Crypto-Hardening","owner":"CERT-Bund","isFork":true,"description":"Best Current Practices regarding secure online communication and configuration of services using cryptography.","allTopics":[],"primaryLanguage":{"name":"TeX","color":"#3D6117"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":99,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-07-17T11:51:32.097Z"}},{"type":"Public archive","name":"misp-warninglists-analyzer","owner":"CERT-Bund","isFork":false,"description":"Checks observables/ioc in TheHive/Cortex against the MISP warningslists","allTopics":["dfir","response","misp","thehive","cortex","incident"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":13,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-12-27T08:16:18.454Z"}},{"type":"Public archive","name":"sinkdb-analyzer","owner":"CERT-Bund","isFork":false,"description":"","allTopics":["dfir","abuse","response","thehive","cortex","sinkhole","incident","sinkdb"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-12-21T08:48:11.346Z"}},{"type":"Public archive","name":"censys-analyzer","owner":"CERT-Bund","isFork":false,"description":"Censys.io analyzer for TheHive/Cortex","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-12-13T07:13:40.790Z"}},{"type":"Public archive","name":"yara-exporter","owner":"CERT-Bund","isFork":false,"description":"Exporting MISP event attributes to yara rules usable with Thor apt scanner","allTopics":["apt","analysis","scanner","incident-response","cert","csirt","thor","misp","yara"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":22,"forksCount":9,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-03-27T05:19:16.880Z"}}],"repositoryCount":10,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"CERT-Bund repositories"}