Analysis Correlation Engine
☆26Sep 8, 2019Updated 6 years ago
Alternatives and similar repositories for ACE
Users that are interested in ACE are comparing it to the libraries listed below
Sorting:
- ☆16Jan 31, 2015Updated 11 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- stoQ Public Plugins☆71Feb 27, 2023Updated 3 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Python API bindings for FireEye Products☆13Feb 17, 2021Updated 5 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- 🇫🇷 A list of neat projects made in France☆14Feb 13, 2025Updated last year
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Dec 5, 2023Updated 2 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆29May 23, 2023Updated 2 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Royal Road RTF Weaponizer object decoder☆24Sep 26, 2024Updated last year
- Automated handling of data feeds for security teams☆148Dec 31, 2025Updated 2 months ago
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆20Feb 10, 2026Updated last month
- Microsoft Compound File Binary (CFB) file format Python IO☆15Mar 8, 2026Updated last week
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆13Dec 3, 2020Updated 5 years ago
- PDF Parser is a command line tool and go library for analyzing PDF files.☆14Jan 25, 2024Updated 2 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Bro Live! A Bro training/learning environment.☆14Jul 21, 2015Updated 10 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated 2 months ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- ☆18Apr 4, 2019Updated 6 years ago
- Publicly shareable windows event log message data☆28Nov 29, 2019Updated 6 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- ☆24Mar 29, 2020Updated 5 years ago
- Generate Gmail Emailing Keyloggers to Windows.☆12Jul 28, 2019Updated 6 years ago
- ☆27Feb 6, 2022Updated 4 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Apr 19, 2023Updated 2 years ago
- A set of tools and procedures for automating NSM and NIDS deployments in AWS☆15Oct 16, 2020Updated 5 years ago
- ☆19Nov 26, 2020Updated 5 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Flask LDAP Authentication Tutorial☆15Feb 5, 2015Updated 11 years ago
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago
- SWF parser and AVM2 (Actionscript 3) bytecode parser☆19Mar 26, 2017Updated 8 years ago