Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and firewall search, collects screenshots, generates report, injects captured artifacts into report, saves generated report with artifacts into a specified directory
☆22Jun 6, 2017Updated 8 years ago
Alternatives and similar repositories for Venator
Users that are interested in Venator are comparing it to the libraries listed below
Sorting:
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- Python scripts to download, parse, and enrich scans.io study data and load into Splunk for research, threat intelligence gathering, and s…☆19Updated this week
- Comprehensive Cheat Sheet for Rapid7's Insight-IDR LEQL Search Language.☆11Mar 18, 2024Updated 2 years ago
- WebAMS is an Open Source web application for reporting and resolving incidents or tickets☆10Dec 11, 2022Updated 3 years ago
- Lockheed Martin developed utility to combine multiple CycloneDX SBOMs☆13Jan 16, 2023Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- Automatic Microsoft Sentinel Deployment☆16Apr 1, 2025Updated 11 months ago
- A Python script for indexing (putting) FireEye alert data into Elasticsearch...and notifying you too.☆16Dec 11, 2018Updated 7 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- Triaging Windows event logs based on SANS Poster☆48Nov 22, 2025Updated 3 months ago
- Parses the FireEye HX .mans triage collections and sends them to ElasticSearch☆17Feb 17, 2023Updated 3 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- This is a python tool aiming to make using TheHive webhooks easier.☆28Oct 23, 2020Updated 5 years ago
- Lockheed Martin developed utility to compare two CycloneDX SBOMs☆19Oct 21, 2021Updated 4 years ago
- Parallel APK analyzer☆51Jan 10, 2017Updated 9 years ago
- EmailScanner is an integration application in python that uses `exchangelib` to process mail items in Microsoft exchange.☆12Apr 9, 2019Updated 6 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Feb 2, 2025Updated last year
- Stalk whoever you want on Github☆13Feb 7, 2020Updated 6 years ago
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 3 months ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago
- OPSEC - Operations Security☆18Nov 16, 2023Updated 2 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- Checklists☆16Sep 22, 2016Updated 9 years ago
- Differents WebShell usefull for CTF☆12Jul 21, 2017Updated 8 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Oct 4, 2016Updated 9 years ago
- Collection of popular DFIR tools in a lightweight and fast docker image☆11Nov 17, 2019Updated 6 years ago
- Python library for threat intelligence☆93Jan 14, 2025Updated last year
- Synapse: a Meta Alert Feeder for TheHive, a Security Incident Response Platform☆71Jul 28, 2023Updated 2 years ago
- Automated Memory Forensic☆34Jul 18, 2018Updated 7 years ago
- Virtual Security Operations Center☆52Aug 28, 2023Updated 2 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Find phishing kits which use your brand/organization's files and image.☆239Jan 21, 2019Updated 7 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Creepy face tracking portrait based on OpenFrameworks and OpenCV. Designed to run on the Raspberry Pi with Raspberry Pi camera.☆23Nov 15, 2015Updated 10 years ago