Ptr32Void / OSTrICaLinks
☆306Updated 8 years ago
Alternatives and similar repositories for OSTrICa
Users that are interested in OSTrICa are comparing it to the libraries listed below
Sorting:
- Threat Intelligence APIs☆278Updated last year
- Honeypot deployment made easy☆236Updated 6 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆151Updated last year
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆465Updated 6 years ago
- ☆203Updated 2 years ago
- A Python RESTful API framework for online malware analysis and threat intelligence services.☆368Updated last year
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- dionaea low interaction honeypot (forked from dionaea.carnivore.it)☆153Updated 9 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 7 years ago
- Version 2 of the ThreatCrowd API☆271Updated 2 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Honeynet Project generic authenticated datafeed protocol☆214Updated last year
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆148Updated 10 years ago
- DPS' Lightweight Investigation Notebook☆430Updated last year
- Open Source Threat Intelligence Chat Bot☆321Updated 5 years ago
- A modular Python application to collect intelligence for malicious hosts.☆268Updated 4 years ago
- Extract files from network traffic with Zeek.☆101Updated 5 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated 2 years ago
- 16,432 Free Yara rules created by☆383Updated 6 years ago
- Machinae Security Intelligence Collector☆523Updated last year
- passivedns-client provides a library and a query tool for querying several passive DNS providers☆201Updated 3 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- CRITs Services Collection☆184Updated 4 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆435Updated 2 years ago
- Query and report user logons relations from MS Windows Security Events☆243Updated 6 years ago
- a network packet capture compiler☆199Updated 3 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 9 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆197Updated 8 years ago