HASH (HTTP Agnostic Software Honeypot)
☆141Feb 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for HASH
Users that are interested in HASH are comparing it to the libraries listed below
Sorting:
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆23Feb 11, 2026Updated 2 weeks ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- ☆40Nov 29, 2024Updated last year
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 5 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 6 months ago
- YARA rule analyzer to improve rule quality and performance☆111Jan 18, 2026Updated last month
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- Sandbox samples and monitor them with kunai☆29Jun 24, 2025Updated 8 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- A lightweight Python module to interact with the MITRE ATT&CK® Enterprise dataset. Built for speed with minimal dependencies. Read the do…☆11Nov 24, 2025Updated 3 months ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆253Nov 18, 2024Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Specifications used in the MISP project including MISP core format☆53Jan 7, 2026Updated last month
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 10 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- A privacy-aware exchange module to securely and privately share your indicators☆14Aug 23, 2017Updated 8 years ago
- ☆14Jan 8, 2026Updated last month
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Jan 21, 2026Updated last month
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 2 weeks ago
- Golang Library to interact with your MISP instance☆22Sep 12, 2019Updated 6 years ago
- Signature based honeypot detector tool written in Golang☆108Mar 22, 2025Updated 11 months ago
- ☆55Apr 25, 2023Updated 2 years ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 8 months ago
- ☆52Dec 13, 2025Updated 2 months ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- A Software as a Service (SaaS) log collection framework.☆182Jan 16, 2026Updated last month
- ☆86Feb 4, 2026Updated 3 weeks ago
- An open source platform to support analysts to organise their case and tasks☆126Updated this week
- YARI is an interactive debugger for YARA Language.☆90Sep 10, 2025Updated 5 months ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated this week
- Gandcrab v5.2 decryption scripts☆16Jan 10, 2020Updated 6 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Modular IMAP proxy (including PyCIRCLeanMail and MISP forward modules)☆32Jul 13, 2018Updated 7 years ago