EmersonElectricCo / pyFireEyeLinks
Python API bindings for FireEye Products
☆13Updated 4 years ago
Alternatives and similar repositories for pyFireEye
Users that are interested in pyFireEye are comparing it to the libraries listed below
Sorting:
- Web based Manager for Yara Rules☆58Updated 5 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 6 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Updated 7 years ago
- Python IOC Editor☆63Updated 10 years ago
- ☆54Updated 5 years ago
- Hunting IOCs all day every day...☆86Updated 2 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Updated 8 years ago
- InvestigationPlaybookSpec☆72Updated 8 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 6 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 6 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated 9 months ago
- Historical Observations of Actionable Reputation Data☆13Updated 7 years ago
- ☆37Updated 8 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 4 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Updated last year
- Yara rules to be used with the Burp Yara-Scanner extension☆49Updated 3 years ago
- A collection of infosec related scripts and information.☆53Updated last year
- A Windows Event Processing Utility☆47Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 8 years ago
- Parses IE's Automatic Crash Recovery Files☆16Updated 8 years ago
- PowerShell No Agent Hunting☆109Updated 7 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 8 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- ☆39Updated 6 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago