URL Abuse - A Versatile Software for URL review, analysis and black-list reporting
☆148Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for url-abuse
Users that are interested in url-abuse are comparing it to the libraries listed below
Sorting:
- Python API for URL Query☆36May 22, 2016Updated 9 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Mar 1, 2019Updated 7 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Dec 11, 2020Updated 5 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN).☆113Aug 31, 2023Updated 2 years ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Flow-based SSH intrusion detection system (NfSen plugin)☆41Dec 10, 2015Updated 10 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆74Apr 4, 2025Updated 11 months ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆45Apr 1, 2022Updated 3 years ago
- Parse a report and import the events into MISP☆30Oct 19, 2015Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,113Feb 14, 2026Updated 2 weeks ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,361Updated this week
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Malware Classifier From Network Captures☆82Jan 27, 2017Updated 9 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Mar 10, 2025Updated 11 months ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- ☆18Jun 8, 2018Updated 7 years ago
- Threat Intelligence APIs☆280Aug 14, 2023Updated 2 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Docker container for MISP☆96Jun 20, 2018Updated 7 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- Compare multiple log formats against malware reputation lists.☆88Jul 27, 2017Updated 8 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Sep 29, 2021Updated 4 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆40Aug 2, 2012Updated 13 years ago