Client API to query the Phishing Initiative service API
☆24Jan 8, 2026Updated last month
Alternatives and similar repositories for PyEUPI
Users that are interested in PyEUPI are comparing it to the libraries listed below
Sorting:
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ☆25Jul 8, 2015Updated 10 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 11 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Powershell tool to download malware samples.☆12Feb 10, 2016Updated 10 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Automatically block IPs with failed SSH logins using pf(4)☆16Aug 21, 2015Updated 10 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 6 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- A content inspecting SMTP proxy☆17Jun 9, 2014Updated 11 years ago
- Avax L1 for the next generation of social based marketing and sales☆12Dec 17, 2024Updated last year
- Test suite for bypassing Malware sandboxes.☆38Oct 20, 2014Updated 11 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Decorators to make REST easier in Bottle.☆21Jun 20, 2022Updated 3 years ago
- ☆15May 18, 2022Updated 3 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- Ubiquiti Inform Protocol in Golang☆18Aug 4, 2025Updated 6 months ago
- Tools used by CSIRT and especially in the scope of CNW☆18Updated this week
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated this week
- A Python parser for Rich Headers☆15Jun 2, 2015Updated 10 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- A friendlier interface to `socket`.☆14Apr 11, 2015Updated 10 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33May 14, 2016Updated 9 years ago
- vstruct based dissectors for various file/protocol formats☆15Jul 27, 2017Updated 8 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago