Cisco-Talos / MusselsLinks
☆53Updated 8 months ago
Alternatives and similar repositories for Mussels
Users that are interested in Mussels are comparing it to the libraries listed below
Sorting:
- Dragon Sandbox☆78Updated 12 years ago
- External plugins for examples, experimental, and some legacy code.☆41Updated last week
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Updated last year
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Open Standard Vulnerability & Compliance Scanner☆45Updated 9 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 years ago
- pcapdj - dispatch pcap files☆46Updated 5 years ago
- The VT Augment widget is an official, compliant and recommended way of integrating VirusTotal data in third-party applications.☆36Updated last year
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆59Updated 7 years ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆73Updated 2 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- Malquarium - Modern Malware Repository☆47Updated 3 weeks ago
- Data to test capa's code and rules.☆42Updated last week
- Passive Network Audit Framework☆32Updated 7 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- This repository contains additional files mentioned in the blog post☆22Updated 6 years ago
- pure Python binary analysis framework☆23Updated 6 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆73Updated last year
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago
- Repository of yara rules☆60Updated 2 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆13Updated 7 months ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Updated last year
- ☆25Updated last month
- GUI Tool to generate threat intelligence information in various formats☆43Updated 7 years ago
- A collection of samples for development and testing of John the Ripper and other password security auditing and password recovery tools☆38Updated last month
- VINCE is the Vulnerability Information and Coordination Environment developed and used by the CERT Coordination Center to improve coordin…☆77Updated 2 weeks ago