Python library for threat intelligence
☆93Jan 14, 2025Updated last year
Alternatives and similar repositories for PyOTI
Users that are interested in PyOTI are comparing it to the libraries listed below
Sorting:
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- ☆24Sep 28, 2022Updated 3 years ago
- Stand-alone parser for User Access Logging from Server 2012 and newer systems☆78Jan 9, 2024Updated 2 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 3 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Elemental - An ATT&CK Threat Library☆318Dec 8, 2022Updated 3 years ago
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.☆69Apr 1, 2025Updated 11 months ago
- Simple web frontend to an elasticsearch database made for local files indexing☆19Oct 25, 2019Updated 6 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆59Nov 21, 2024Updated last year
- A PowerShell incident response script for quick triage☆81Jul 18, 2022Updated 3 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 2 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Jun 6, 2017Updated 8 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Dec 9, 2020Updated 5 years ago
- IDA Pro Instruction Reference Plugin☆14Oct 2, 2019Updated 6 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 5 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- ATTPwn☆217Mar 9, 2024Updated last year
- A Windows event logging and collection baseline focused on finding balance between forensic value and optimising retention.☆293Aug 26, 2021Updated 4 years ago
- ☆19Mar 23, 2021Updated 4 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆461Dec 1, 2025Updated 3 months ago