ANSSI-FR / OVALILinks
Generic graph exploration, manipulation and visualization tool (Outil de Visualisation et Analyse de Liens Inter-objets)
☆35Updated 5 years ago
Alternatives and similar repositories for OVALI
Users that are interested in OVALI are comparing it to the libraries listed below
Sorting:
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 9 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 3 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 7 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Python script to automatically create sigma rules from The hive observables☆25Updated 6 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 2 years ago
- Splunk integration with MISP☆12Updated 7 years ago
- Incident Response Scripts☆30Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- ☆52Updated 7 years ago
- Cli interface to threatcrowd.org☆20Updated 8 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Updated 6 years ago
- A Windows Event Processing Utility☆47Updated 7 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- A security tool for detecting suspicious PDF modifications commonly found in BEC☆41Updated 9 years ago
- ☆15Updated 7 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Updated 7 years ago
- A collection of typical false positive indicators☆55Updated 5 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 2 months ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Updated 8 years ago