AlienVault-OTX / OTX-Java-SDKLinks
The Java-based SDK for the Open Threat Exchange API.
☆36Updated 2 years ago
Alternatives and similar repositories for OTX-Java-SDK
Users that are interested in OTX-Java-SDK are comparing it to the libraries listed below
Sorting:
- Alienvault OTX Bro IDS Connector☆78Updated 10 years ago
- Tools for working with the CERT Vulnerability Data Archive. See also https://github.com/CERTCC/Vulnerability-Data-Archive☆21Updated last year
- Global IRT (Incident Response Team) is a project to describe common IRT and abuse contact information☆77Updated 2 years ago
- ☆36Updated 5 years ago
- ☆36Updated 11 years ago
- Maltego transforms for the ThreatCrowd search API☆47Updated 7 years ago
- Indicators of Compromise (IOCs) for malware we have researched☆11Updated 2 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Repository for various tools around security☆41Updated last year
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆35Updated 10 years ago
- Passive SSL client fingerprinting using handshake analysis.☆112Updated 8 years ago
- VirusTotal tools☆92Updated 5 years ago
- CVE Automation Working Group☆180Updated this week
- CVE Project Documentation☆86Updated 6 months ago
- Set of test cases that can be used to test custom implementations of the SecRules language (ModSecurity rules format).☆15Updated 11 months ago
- This is a prototype system that uses Hadoop to process hard drive images.☆52Updated 13 years ago
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Updated 10 years ago
- ☆11Updated 5 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆35Updated 9 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- Phishing e-mail repository☆36Updated 5 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆80Updated 9 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 15 years ago
- Dragon Sandbox☆79Updated 12 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Malware static analysis framework☆184Updated 5 years ago
- A tool designed for consistent and safe capture of off network web resources.☆39Updated 8 years ago
- Evil Genius plays the role of the Descartes demon, creating a distorted view of the internet with censorship (it's a censorship simulator…☆38Updated 11 years ago