Potiron - Normalize, Index and Visualize Network Capture
☆88Mar 1, 2019Updated 7 years ago
Alternatives and similar repositories for potiron
Users that are interested in potiron are comparing it to the libraries listed below
Sorting:
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆148Dec 8, 2022Updated 3 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Client API to query the Phishing Initiative service API☆24Jan 8, 2026Updated last month
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 11 years ago
- BGP Hijack Detection☆117Feb 14, 2018Updated 8 years ago
- vagrant multi-machine: Moloch, Bro,Suricata,ElasticSearch,Kibana☆41Nov 24, 2014Updated 11 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆20Feb 10, 2026Updated 3 weeks ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆17Sep 30, 2016Updated 9 years ago
- Docker container for MISP☆96Jun 20, 2018Updated 7 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- A Docker container for Moloch based on minimal Debian☆26Jan 25, 2016Updated 10 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,362Feb 23, 2026Updated last week
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- Modern Honey Network App for Splunk☆50Sep 30, 2019Updated 6 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Apr 7, 2019Updated 6 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆81Feb 18, 2026Updated last week
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- SEC599 supporting GitHub repository☆16Sep 14, 2019Updated 6 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- A program that uses xapian to index the flat file databases used by nfdump or flow-tools☆36Mar 26, 2018Updated 7 years ago
- Network Security Monitoring Framework☆48Oct 19, 2012Updated 13 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆86May 22, 2023Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago