HolmesProcessing / Holmes-StorageLinks
The Storage Planner manages access to all data within the Holmes Processing system. It orchestrates the interaction across multiple Databases, serves the files for analysis, etc.
☆16Updated 6 years ago
Alternatives and similar repositories for Holmes-Storage
Users that are interested in Holmes-Storage are comparing it to the libraries listed below
Sorting:
- Main program for receiving tasking and objects. It validates input, checks authentication, and pushes the requests to the pipeline.☆14Updated 8 years ago
- Investigation Planner for long running analysis with unpredictable execution time. For example, dynamic analysis.☆16Updated 8 years ago
- Investigation Planner for fast running analysis with predictable execution time. For example, static analysis.☆28Updated 6 years ago
- ☆30Updated 7 years ago
- ☆12Updated 8 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Passivedns monitor implementation in Rust.☆12Updated 9 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 6 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆35Updated 9 years ago
- (OBSOLETE) Plugins for Bro☆53Updated 8 years ago
- A tool to extract structured cyber information from incident reports.☆82Updated 7 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆80Updated last year
- Malware Classifier From Network Captures☆82Updated 8 years ago
- Realtime and Online Model Development Framework☆27Updated 8 years ago
- ☆14Updated 9 years ago
- Bro Snippets☆21Updated 11 years ago
- A Python library for being a CND Batman....☆35Updated 10 years ago
- threat language parser☆60Updated 10 years ago
- AMICO - Accurate Behavior-Based Detection of Malware Downloads☆31Updated 8 years ago
- ☆28Updated 8 years ago
- ☆29Updated 9 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Updated 8 years ago
- Code for Rumal Backend that will interface with Thug Daemon☆11Updated 8 years ago
- Packetpig - Open Source Big Data Security Analytics☆298Updated 7 years ago
- Virus names generator☆28Updated 10 years ago
- Bro-IDS scripts☆50Updated 9 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox☆148Updated 3 years ago
- Gather and compile open source threat intelligence feeds.☆40Updated 3 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 10 years ago