Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and firewall search, collects screenshots, generates report, injects captured artifacts into report, saves generated report with artifacts into a specified directory
☆23Jun 6, 2017Updated 8 years ago
Alternatives and similar repositories for Venator
Users that are interested in Venator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- PowerShell Module for the Antimalware Scan Interface (AMSI)☆25Oct 26, 2016Updated 9 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆20May 12, 2026Updated last week
- Comprehensive Cheat Sheet for Rapid7's Insight-IDR LEQL Search Language.☆11Mar 18, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- WebAMS is an Open Source web application for reporting and resolving incidents or tickets☆10Dec 11, 2022Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 6 years ago
- A Python script for indexing (putting) FireEye alert data into Elasticsearch...and notifying you too.☆16Dec 11, 2018Updated 7 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 6 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- Triaging Windows event logs based on SANS Poster☆47Nov 22, 2025Updated 5 months ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Parses the FireEye HX .mans triage collections and sends them to ElasticSearch☆17Feb 17, 2023Updated 3 years ago
- This is a python tool aiming to make using TheHive webhooks easier.☆28Oct 23, 2020Updated 5 years ago
- Lockheed Martin developed utility to compare two CycloneDX SBOMs☆19Oct 21, 2021Updated 4 years ago
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- EmailScanner is an integration application in python that uses `exchangelib` to process mail items in Microsoft exchange.☆12Apr 9, 2019Updated 7 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Feb 2, 2025Updated last year
- Stalk whoever you want on Github☆13Feb 7, 2020Updated 6 years ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 5 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- OPSEC - Operations Security☆18Nov 16, 2023Updated 2 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆12Oct 29, 2021Updated 4 years ago
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Jul 28, 2023Updated 2 years ago
- Virtual Security Operations Center☆52Aug 28, 2023Updated 2 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Python library for threat intelligence☆102Jan 14, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Find phishing kits which use your brand/organization's files and image.☆241Jan 21, 2019Updated 7 years ago
- Creepy face tracking portrait based on OpenFrameworks and OpenCV. Designed to run on the Raspberry Pi with Raspberry Pi camera.☆23Nov 15, 2015Updated 10 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 11 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 3 years ago
- This proxy signs requests with AWS IAM credentials.☆13Jul 11, 2023Updated 2 years ago
- Local osx dialog box phishing using osascript. Easier than keylogging on osx. Simply ask for the passwords you want.☆56Nov 1, 2018Updated 7 years ago