Email Abuse - A Versatile Software for Email review, analysis and reporting
☆21Jul 17, 2015Updated 10 years ago
Alternatives and similar repositories for email-abuse
Users that are interested in email-abuse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated 2 months ago
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆20Feb 10, 2026Updated last month
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated 2 months ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Python module to use the MISP Taxonomies☆31Updated this week
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆148Dec 8, 2022Updated 3 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Feb 20, 2015Updated 11 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 11 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Mar 10, 2025Updated last year
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33May 14, 2016Updated 9 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Automatically block IPs with failed SSH logins using pf(4)☆16Aug 21, 2015Updated 10 years ago
- Parser for zebra/MRT BGP routes dumps.☆41Nov 7, 2016Updated 9 years ago
- Cyber Intel Management☆50Jan 25, 2018Updated 8 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- ☆21Apr 8, 2015Updated 10 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- A content inspecting SMTP proxy☆17Jun 9, 2014Updated 11 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Scripts to deploy and update MISP in air-gapped environments☆17Jan 20, 2026Updated 2 months ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- ☆11Jan 22, 2020Updated 6 years ago
- ☆16Jan 31, 2015Updated 11 years ago