URL Abuse - A Versatile Software for URL review, analysis and black-list reporting
☆148Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for url-abuse
Users that are interested in url-abuse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python API for URL Query☆36May 22, 2016Updated 9 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆113Aug 31, 2023Updated 2 years ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago
- Python Certificate Transparency client☆11Feb 8, 2015Updated 11 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- Flow-based SSH intrusion detection system (NfSen plugin)☆41Dec 10, 2015Updated 10 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,366Updated this week
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆46Apr 1, 2022Updated 3 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,116Feb 14, 2026Updated last month
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆75Apr 4, 2025Updated 11 months ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- Parse a report and import the events into MISP☆30Oct 19, 2015Updated 10 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Compare multiple log formats against malware reputation lists.☆88Jul 27, 2017Updated 8 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Threat Intelligence APIs☆281Aug 14, 2023Updated 2 years ago
- Hunting IOCs all day every day...☆88Sep 26, 2023Updated 2 years ago
- pcapdj - dispatch pcap files☆46Jul 28, 2020Updated 5 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Mar 10, 2025Updated last year