S03D4-164 / HiryuView external linksLinks
IOC Management and Visualization Tool
☆48Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for Hiryu
Users that are interested in Hiryu are comparing it to the libraries listed below
Sorting:
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- threat language parser☆60Apr 20, 2015Updated 10 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Home to the ActorTrackr source code☆30Aug 31, 2017Updated 8 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆69Mar 9, 2015Updated 10 years ago
- 16,432 Free Yara rules created by☆390Jun 1, 2019Updated 6 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 6 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 2 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 9 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- ☆15Mar 13, 2018Updated 7 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 8 months ago
- Cyber Intel Management☆51Jan 25, 2018Updated 8 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- Threat Intelligence APIs☆282Aug 14, 2023Updated 2 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Apr 22, 2018Updated 7 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- An open source framework for enterprise level automated analysis.☆393Jun 27, 2022Updated 3 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 10 years ago