CIRCL / url-abuseLinks
URL Abuse - A Versatile Software for URL review, analysis and black-list reporting
☆143Updated 2 years ago
Alternatives and similar repositories for url-abuse
Users that are interested in url-abuse are comparing it to the libraries listed below
Sorting:
- IntelMQ Manager is a graphical interface to manage configurations for IntelMQ framework.☆105Updated 3 months ago
- A framework for receiving and redistributing abuse feeds☆124Updated 5 years ago
- Docker container for MISP☆96Updated 7 years ago
- Multithreaded threat Intelligence gathering built with Python3☆175Updated 7 years ago
- Threat Feed Aggregation, Made Easy☆168Updated 4 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Updated 4 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆66Updated 7 years ago
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- Hunting IOCs all day every day...☆86Updated last year
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆141Updated 2 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆121Updated 3 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 9 years ago
- Threat Intelligence APIs☆279Updated last year
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆141Updated 6 years ago
- Sandia Cyber Omni Tracker (SCOT)☆248Updated 8 months ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆93Updated 6 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆81Updated 9 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 9 years ago
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- CRITs Services Collection☆184Updated 4 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Spam Honeypot with Intelligent Virtual Analyzer☆138Updated 3 months ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- An OpenTAXII Configuration for MISP☆82Updated 2 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Network Forensics Bro scripts & pcap samples☆62Updated 11 years ago
- Miscelaneous useful scripts for my day to day projects