List of Awesome Vertex Synapse Resources
☆28Aug 6, 2024Updated last year
Alternatives and similar repositories for awesome-synapse
Users that are interested in awesome-synapse are comparing it to the libraries listed below
Sorting:
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Local GOLANG Transform Wrapper for Maltego☆17Feb 25, 2016Updated 10 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Synapse Central Intelligence System☆435Updated this week
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆169Nov 10, 2023Updated 2 years ago
- 🗞 Monitors data sources, alerts you when they change☆13Jul 23, 2021Updated 4 years ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- ☆15Sep 24, 2024Updated last year
- Query.AI plugin for Kibana☆13Nov 10, 2019Updated 6 years ago
- Python Library for ConfigExtractor☆15Feb 24, 2026Updated last week
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- Local Transform Wrapper for Maltego☆11May 24, 2016Updated 9 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- Explore AI Supply Chain Risk with the AI Risk Database☆66May 8, 2024Updated last year
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated last year
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- PCAP files are analysed using python. DNS delays, congestion window sizes, through put and good put are calculated.☆12Jul 1, 2015Updated 10 years ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 2 years ago
- Chapter 9: Disseminate☆16Sep 6, 2017Updated 8 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- ☆17Sep 29, 2023Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- Import specific data sources into the Sigma generic and open signature format.☆79May 6, 2022Updated 3 years ago
- Intelligence Architecture Mind Map☆145Mar 15, 2024Updated last year
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 10 years ago
- External twitter feeder for AIL framework☆16Apr 16, 2023Updated 2 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Sep 24, 2014Updated 11 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- ☆56Jul 1, 2024Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago