1aN0rmus / TekDefense-AutomaterView external linksLinks
Automater - IP URL and MD5 OSINT Analysis
☆554Aug 13, 2024Updated last year
Alternatives and similar repositories for TekDefense-Automater
Users that are interested in TekDefense-Automater are comparing it to the libraries listed below
Sorting:
- Machinae Security Intelligence Collector☆538May 15, 2024Updated last year
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Malicious HTTP traffic explorer☆725Mar 16, 2023Updated 2 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Nov 3, 2017Updated 8 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,223Nov 20, 2025Updated 2 months ago
- Incident Response Forensic Framework☆611Nov 20, 2019Updated 6 years ago
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- Threat Intelligence APIs☆282Aug 14, 2023Updated 2 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆629Jun 25, 2024Updated last year
- Web App for Volatility framework☆389Jan 13, 2026Updated last month
- Web interface for the Volatility Memory Forensics Framework☆260Nov 21, 2017Updated 8 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- VolDiff: Malware Memory Footprint Analysis based on Volatility☆197Sep 12, 2017Updated 8 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- Modular file scanning/analysis framework☆621Oct 8, 2019Updated 6 years ago
- An open source framework for enterprise level automated analysis.☆393Jun 27, 2022Updated 3 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 2 years ago
- ☆519Jan 26, 2021Updated 5 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 8 months ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,107Dec 2, 2025Updated 2 months ago
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- Multithreaded threat Intelligence gathering built with Python3☆177Jan 23, 2018Updated 8 years ago
- Your Everyday Threat Intelligence☆1,949Updated this week
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- Docker container for MISP☆96Jun 20, 2018Updated 7 years ago
- CRITs - Collaborative Research Into Threats☆909Jul 29, 2019Updated 6 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆554May 9, 2023Updated 2 years ago
- Compare multiple log formats against malware reputation lists.☆88Jul 27, 2017Updated 8 years ago
- ☆305May 28, 2017Updated 8 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- Malware static analysis framework☆185Apr 1, 2020Updated 5 years ago