Python API Client for Cortex
☆33Feb 24, 2022Updated 4 years ago
Alternatives and similar repositories for Cortex4py
Users that are interested in Cortex4py are comparing it to the libraries listed below
Sorting:
- Python API Client for TheHive☆237Feb 8, 2026Updated last month
- Cortex Analyzers Repository☆477Mar 11, 2026Updated last week
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,559Nov 26, 2025Updated 3 months ago
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- bash script to enumerate vulnerabilities on specific year through Shodan API☆46Dec 5, 2018Updated 7 years ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,895Jul 25, 2025Updated 7 months ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆129Jan 9, 2023Updated 3 years ago
- Message filter plugin to reverse lookup the source field☆10Jan 8, 2018Updated 8 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Ansible Galaxy Role to install and uninstall Cyberark AIM provider☆15Jan 17, 2023Updated 3 years ago
- Pattern recognition for hosts, services, and content☆14Aug 19, 2022Updated 3 years ago
- A python library for runtime validation and type checking of python values.☆10Aug 11, 2022Updated 3 years ago
- A flexible, easy to use, automation framework allowing users to integrate their capabilities and devices to cut through the repetitive, t…☆12Nov 23, 2022Updated 3 years ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Ansible playbook to convert Sigma rules to ElastAlert rules☆10Feb 5, 2021Updated 5 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated 2 months ago
- Discover TimeDateStamps In PE File☆17Dec 12, 2015Updated 10 years ago
- ☆12Dec 10, 2020Updated 5 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Documentation of Cortex☆174Sep 20, 2023Updated 2 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- The combined Python code for the post "Elliptic Curves over Finite Fields"☆17Jun 9, 2020Updated 5 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Oct 29, 2019Updated 6 years ago
- List full of Bullshit Domains to block with your Pihole, includes Adservers, Tracking services Phishing and Malware Scum☆16Apr 28, 2021Updated 4 years ago
- cyberarkpassword Lookup Plugin☆18Nov 17, 2017Updated 8 years ago
- A PowerShell module for creating and removing Loopback Network Adapters on Windows using Device Conslole (DevCon.exe)☆15Feb 26, 2021Updated 5 years ago
- Automatically exported from code.google.com/p/pweb-suite☆14Jun 8, 2016Updated 9 years ago
- A (basic) Mach-O Library☆23Sep 13, 2021Updated 4 years ago
- ☆34Jan 22, 2025Updated last year
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- A framework for receiving and redistributing abuse feeds☆125Sep 27, 2019Updated 6 years ago
- GCNotify is an Outlook addin for quickly forwarding mail as attachment to a pre-defined e-mail address.☆12Jan 17, 2023Updated 3 years ago
- ☆19Sep 21, 2020Updated 5 years ago
- ☆21Dec 22, 2020Updated 5 years ago