AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project
☆1,362Updated this week
Alternatives and similar repositories for AIL-framework
Users that are interested in AIL-framework are comparing it to the libraries listed below
Sorting:
- AIL framework - Analysis Information Leak framework☆884Updated this week
- Your Everyday Threat Intelligence☆1,951Feb 12, 2026Updated 2 weeks ago
- FAME Automates Malware Evaluation☆928Dec 16, 2025Updated 2 months ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,113Feb 14, 2026Updated 2 weeks ago
- Fast Incident Response☆1,995Feb 17, 2026Updated last week
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,141Updated this week
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,486Jan 12, 2026Updated last month
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,890Jul 25, 2025Updated 7 months ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated last month
- Incident Response Forensic Framework☆611Nov 20, 2019Updated 6 years ago
- Scanning pastebin with yara rules☆1,127Jan 10, 2026Updated last month
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,516Jan 12, 2026Updated last month
- A toolset to make a system look as if it was the victim of an APT attack☆2,715Sep 23, 2025Updated 5 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,906Jul 6, 2024Updated last year
- Incident Response Methodologies☆1,018Aug 2, 2018Updated 7 years ago
- Malcom - Malware Communications Analyzer☆1,164Nov 29, 2017Updated 8 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,138Oct 19, 2025Updated 4 months ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆554May 9, 2023Updated 2 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,850Nov 17, 2021Updated 4 years ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,953Feb 20, 2026Updated last week
- Loki - Simple IOC and YARA Scanner☆3,726Jan 12, 2026Updated last month
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,225Nov 20, 2025Updated 3 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,314Jan 22, 2025Updated last year
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,553Nov 26, 2025Updated 3 months ago
- Malspider is a web spidering framework that detects characteristics of web compromises.☆417Nov 4, 2022Updated 3 years ago
- Builds malware analysis Windows VMs so that you don't have to.☆1,045Aug 23, 2021Updated 4 years ago
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated 11 months ago
- CRITs - Collaborative Research Into Threats☆909Jul 29, 2019Updated 6 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Phishing catcher using Certstream☆1,793Aug 13, 2024Updated last year
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- Collaborative forensic timeline analysis☆3,271Updated this week
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,036May 27, 2020Updated 5 years ago
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,600Apr 15, 2025Updated 10 months ago
- Extract and aggregate threat intelligence.☆906Jan 31, 2024Updated 2 years ago