Generic graph exploration, manipulation and visualization tool (Outil de Visualisation et Analyse de Liens Inter-objets)
☆36Aug 17, 2020Updated 5 years ago
Alternatives and similar repositories for OVALI
Users that are interested in OVALI are comparing it to the libraries listed below
Sorting:
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- A simple TLS forwarder that lets you intercept traffic and play with them.☆29Apr 29, 2019Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Markov Chain based fraud detection system in Spark.☆14Feb 9, 2016Updated 10 years ago
- PowerShell Utilities for Security Situational Awareness☆13Jan 10, 2017Updated 9 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 3 years ago
- Active Directory Control Paths auditing and graphing tools☆679Dec 17, 2020Updated 5 years ago
- Implementations of the GEA-1 and GEA-2 (GPRS Encryption Algorithm) stream ciphers in C, Python and Rust.☆17Feb 24, 2026Updated last week
- Active Directory Group Policy analyzer☆108Apr 10, 2014Updated 11 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- hashdb block hash database tool and API☆45Mar 21, 2019Updated 6 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆17Nov 7, 2020Updated 5 years ago
- Stochastic Traffic Factoring Utility☆16Nov 5, 2016Updated 9 years ago
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- Machine Learning for Computer Security☆281Jan 6, 2022Updated 4 years ago
- ☆16Mar 10, 2017Updated 8 years ago
- Meteor based NSA items database and vizualisation☆22Feb 22, 2015Updated 11 years ago
- Public version of PDF X-RAY☆59Apr 9, 2012Updated 13 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- A Pictorial Book of Tor Hidden Services.☆25Dec 1, 2017Updated 8 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- CTI database generator and public dataset☆21Jan 12, 2020Updated 6 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆96Feb 12, 2025Updated last year
- MSTSC Packet Dump Utility☆30Feb 11, 2022Updated 4 years ago
- Collaborative malware analysis framework☆381Jan 22, 2019Updated 7 years ago
- A Simple Network Stream Recorder☆35Mar 23, 2019Updated 6 years ago
- MISP website (hugo-based)☆25Updated this week
- Split and compare ProcMon trace logs using a visual diff tool☆24Aug 16, 2018Updated 7 years ago
- The Open Command and Control Forum promotes the global development and adoption of the OpenC2 language and reference material.☆30May 25, 2017Updated 8 years ago
- Identifies phishing websites using a treebag model☆22Oct 14, 2020Updated 5 years ago
- An Exploration into Graph Databases☆28Oct 7, 2015Updated 10 years ago
- Common Industrial Protocol based device scanner over the internet☆24Mar 10, 2016Updated 9 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago