EXC3L-ONE / awesome-synapseView external linksLinks
List of Awesome Vertex Synapse Resources
☆28Aug 6, 2024Updated last year
Alternatives and similar repositories for awesome-synapse
Users that are interested in awesome-synapse are comparing it to the libraries listed below
Sorting:
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 7 months ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Local GOLANG Transform Wrapper for Maltego☆17Feb 25, 2016Updated 9 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆169Nov 10, 2023Updated 2 years ago
- 🗞 Monitors data sources, alerts you when they change☆13Jul 23, 2021Updated 4 years ago
- Python Library for ConfigExtractor☆14Feb 4, 2026Updated last week
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- Explore AI Supply Chain Risk with the AI Risk Database☆66May 8, 2024Updated last year
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- Links to malware-related YARA rules☆15Sep 29, 2022Updated 3 years ago
- ☆17Sep 29, 2023Updated 2 years ago
- Chapter 9: Disseminate☆16Sep 6, 2017Updated 8 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- Intelligence Architecture Mind Map☆144Mar 15, 2024Updated last year
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 9 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- External twitter feeder for AIL framework☆16Apr 16, 2023Updated 2 years ago
- ☆56Jul 1, 2024Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- 🦅 Falcon Malware Sandbox APIv2 Connector☆30Mar 22, 2023Updated 2 years ago
- ☆90Jan 4, 2023Updated 3 years ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- a program can deobfuscate hyperion python to original code☆26Oct 25, 2024Updated last year
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- A tools to work on suricata stats.log file.☆29Oct 14, 2015Updated 10 years ago
- A list of Per-Reviewed Journals, Books and Blogs on intelligence and Cybersecurity☆25Apr 1, 2024Updated last year
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 12 years ago