Application for STIX v2.0 objects management and analysis
☆27Nov 9, 2017Updated 8 years ago
Alternatives and similar repositories for STrelok
Users that are interested in STrelok are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A training course for BambooFox☆25Mar 18, 2016Updated 10 years ago
- write up for pwnable.kr☆24Nov 1, 2017Updated 8 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- Python API for generating Maltego mtgx files.☆18Sep 27, 2016Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Maltego entity pack encompassing the entire STIX 1.2 data model and a targeted subset of the CybOX 2.1 data model☆11Mar 24, 2016Updated 10 years ago
- Reinforced Mitigation Security Filter☆15Sep 26, 2021Updated 4 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- A desktop App to add STIX-2 objects to TAXII-2.0 servers☆11Mar 13, 2019Updated 7 years ago
- Automated threat intelligence collection with McAfee ATD, OpenDXL and MISP☆22Feb 21, 2020Updated 6 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- ☆24Aug 30, 2019Updated 6 years ago
- OASIS TC Open Repository: STIX Enhancement Proposals (SEPs) https://github.com/oasis-open/cti-sep-repository☆16Jun 15, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- Crypto ransomware detection & prevention☆19Jul 26, 2016Updated 9 years ago
- Automated OpenDXL Output information via IntelMQ☆14Jul 20, 2017Updated 8 years ago
- A set of commandline tools for creating and recovering Shamir Secret Shares.☆16Mar 1, 2019Updated 7 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- Translate STIX 2 Patterning Queries☆31Oct 4, 2018Updated 7 years ago
- After attackers manage to gain access to a remote (or local) machine and elevate their privileges to "root", they typically want to maint…☆36Jan 3, 2017Updated 9 years ago
- Tainted PhantomJS☆52Jul 6, 2015Updated 10 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54May 3, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- OASIS TC Open Repository: GitHub Pages site for STIX and TAXII☆108Mar 24, 2026Updated 2 weeks ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 11 months ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- 分析ツール結果シート☆19Nov 13, 2017Updated 8 years ago
- OASIS CTI TC: Provides issue tracking and wiki pages for the STIX 2.x Work Products☆25Sep 12, 2025Updated 6 months ago
- ☆13Mar 23, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- Home to the ActorTrackr source code☆30Aug 31, 2017Updated 8 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Convert reStructuredText to PDF☆18Jul 12, 2015Updated 10 years ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 8 years ago