HurricaneLabs / machinae
Machinae Security Intelligence Collector
☆512Updated 11 months ago
Alternatives and similar repositories for machinae:
Users that are interested in machinae are comparing it to the libraries listed below
- DPS' Lightweight Investigation Notebook☆429Updated last year
- 16,432 Free Yara rules created by☆383Updated 5 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆543Updated last year
- A modular Python application to collect intelligence for malicious hosts.☆265Updated 4 years ago
- Modular file scanning/analysis framework☆619Updated 5 years ago
- Threat Intelligence APIs☆279Updated last year
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆464Updated 6 years ago
- Open Source Threat Intelligence Chat Bot☆322Updated 5 years ago
- FAME Automates Malware Evaluation☆890Updated this week
- A collection of sources of indicators of compromise.☆850Updated 6 months ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- An open source framework for enterprise level automated analysis.☆396Updated 2 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 7 years ago
- A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.☆479Updated 4 years ago
- ☆507Updated 4 years ago
- Version 2 of the ThreatCrowd API☆269Updated 2 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆369Updated 11 months ago
- Automater - IP URL and MD5 OSINT Analysis☆543Updated 8 months ago
- Extract and aggregate threat intelligence.☆859Updated last year
- ☆307Updated 7 years ago
- A low to medium interaction honeypot.☆466Updated last year
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆943Updated 3 years ago
- Honeypot Intelligence with Splunk☆253Updated 6 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆500Updated 2 years ago
- An information security preparedness tool to do adversarial simulation.☆1,121Updated 6 years ago
- Incident Response Forensic Framework☆600Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,268Updated 3 months ago
- Web App for Volatility framework☆380Updated 4 months ago
- Documentation of TheHive☆396Updated last year