IOC Management and Visualization Tool
☆48Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for Hiryu
Users that are interested in Hiryu are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆99May 20, 2016Updated 9 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 10 years ago
- threat language parser☆59Apr 20, 2015Updated 11 years ago
- 16,432 Free Yara rules created by☆388Jun 1, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Home to the ActorTrackr source code☆30Aug 31, 2017Updated 8 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- Cli interface to threatcrowd.org☆21Jul 6, 2017Updated 8 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Cyber Intel Management☆50Jan 25, 2018Updated 8 years ago
- ☆30Feb 25, 2017Updated 9 years ago
- DPS' Lightweight Investigation Notebook☆434Dec 31, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 9 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆71Mar 9, 2015Updated 11 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- A Python command line argument to object parsing library for command line application development☆15Mar 23, 2016Updated 10 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 11 years ago
- Open platform for modelling, collection and exchange of knowledge☆165May 9, 2025Updated 11 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Threat Intelligence APIs☆283Apr 2, 2026Updated last month
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Hunting IOCs all day every day...☆89Sep 26, 2023Updated 2 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Updated this week
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Apr 22, 2018Updated 8 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 10 months ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Open-source python project to handle the storage and linking of open-source intelligence (ala Maltego)☆120Apr 11, 2018Updated 8 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago