What is Chista:
Chista is an Open Source Cyber Threat Intelligence (CTI) Framework designed to help users understand, predict and defend against cyber threats.
It helps its users understand cyber threats by using data collected from various sources. This data includes IOCs, data leaks, phishing campaigns, threat group activities and CTI sources. By analyzing this data, Chista helps users understand the existence, prevalence, trends and probability of cyber threats.
Screen shots:
Features:
- Collecting IOCs: IOCs are signatures used to identify and track cyber threats. Chista can collect IOCs from various sources and make them available to users.
- Monitoring Data Leaks: Chista can identify accounts that have suffered a data breach by monitoring data leaks from various sources.
- Monitoring Phishing Campaigns: Chista detects websites created for phishing purposes and provides users with a feed in this direction.
- Monitoring Threat Groups Activities: Threat groups are
organized groups that carry out cyber attacks. By monitoring threat
group activity from various sources, Chista helps organizations
understand and prepare for the activities of threat groups.
- Detection of Blacklisted IPs: Chista provides users with a feed for IPs blacklisted by various lists.
- Detailing Threat Groups: Chista brings together details of cybercrime groups, allowing users to get detailed information about threat groups.
- Providing Resources: Chista provides resources that can be used for threat intelligence for the benefit of users interested in Cyber Threat Intelligence.
Requirements:
- go1.21
- Python 3.6+
- It is needed for OpenSquat.
- OpenSquat
- search.censys.io API ID and API KEY
- It's used in Phishing module and controlled in .ENV file with
CENSYS_API_SECRET
key. We'll see .ENV file in the Configuration section.
- It's used in Phishing module and controlled in .ENV file with
7777
and7778
ports should be available- "google-chrome" executable file should present in $PATH
- You need to install Google Chrome and it's executable should be found in your PATH (Environment Variables in Windows)