NoDataFound / RiskIQ.SunBurst.HunterView external linksLinks
The Purpose of this research tool is to provide a Python client into RiskIQ API services.
☆22Feb 4, 2021Updated 5 years ago
Alternatives and similar repositories for RiskIQ.SunBurst.Hunter
Users that are interested in RiskIQ.SunBurst.Hunter are comparing it to the libraries listed below
Sorting:
- I am a simple shell script that downloads all repositories from a user and then hunts them for sh1t.☆11Jul 21, 2022Updated 3 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆18Mar 15, 2024Updated last year
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆20Updated this week
- An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, fo…☆13Aug 19, 2022Updated 3 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map t…☆111Oct 30, 2019Updated 6 years ago
- Tweettioc Splunk App☆20Aug 25, 2020Updated 5 years ago
- External twitter feeder for AIL framework☆16Apr 16, 2023Updated 2 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Converting data from services like Censys and Shodan to a common data model☆51Updated this week
- ☆16Apr 30, 2024Updated last year
- SightingDB is a database for Sightings☆22Jun 21, 2023Updated 2 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆27Nov 11, 2020Updated 5 years ago
- DEbian Cve REproducer Tool☆27Jan 8, 2026Updated last month
- ☆23Jun 1, 2023Updated 2 years ago
- because twin clams are better than one clam?☆29Jan 30, 2026Updated 2 weeks ago
- ☆24Sep 28, 2022Updated 3 years ago
- Password and email checker. It is your password or email compromissed? Check it now!☆11Dec 8, 2022Updated 3 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 8 months ago
- Ultimate Applocker Hardening Configuration Script.☆35Jul 26, 2024Updated last year
- AppLocker hardening policies☆26Jul 26, 2018Updated 7 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Nov 11, 2023Updated 2 years ago
- A PowerShell tool which provides an easy way to check for shared passwords between Windows Active Directory accounts☆32Feb 12, 2019Updated 7 years ago
- Lists of not-suitable-for-work words as YARA rules☆29Feb 2, 2026Updated last week
- A Python implementation of our efficient Bloom filter library.☆29Feb 27, 2020Updated 5 years ago
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆35Oct 21, 2025Updated 3 months ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Presentations from the CX Security Labs team☆35Jul 24, 2025Updated 6 months ago