Potiron - Normalize, Index and Visualize Network Capture
☆88Mar 1, 2019Updated 7 years ago
Alternatives and similar repositories for potiron
Users that are interested in potiron are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆148Dec 8, 2022Updated 3 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated 2 months ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Nov 24, 2014Updated 11 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Docker container for MISP☆96Jun 20, 2018Updated 7 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆17Sep 30, 2016Updated 9 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- A program that uses xapian to index the flat file databases used by nfdump or flow-tools☆36Mar 26, 2018Updated 7 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- A Python implementation of our efficient Bloom filter library.☆29Feb 27, 2020Updated 6 years ago
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Feb 18, 2026Updated last month
- A Docker container for Moloch based on minimal Debian☆26Jan 25, 2016Updated 10 years ago
- SEC599 supporting GitHub repository☆16Sep 14, 2019Updated 6 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- Open Source testing framework for image correlation, distance and analysis☆44May 2, 2023Updated 2 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago