UTSA-cyber / sceadan
Systematic Classification Engine for Advanced Data ANalysis
☆22Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for sceadan
- Data package with attacks against civil society☆13Updated 8 years ago
- Python tool for bulk PDF feature extraction. This tool is a prototype.☆24Updated 7 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Updated 8 years ago
- Python library for image hashing and deduplication☆11Updated 8 years ago
- AFF4 Standard Documents☆25Updated 2 years ago
- Homographs: brutefind homographs within a font☆18Updated 7 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Updated 9 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 10 years ago
- Parallel ssdeep clustering kit☆19Updated 6 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 4 years ago
- A vulnerability assessment tool for system models☆13Updated 3 years ago
- Virustotal Data to Timesketch☆17Updated 5 years ago
- A content inspecting SMTP proxy☆17Updated 10 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆32Updated 8 months ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- Automate the regular transfer of AIS data into a MISP Server☆6Updated 5 months ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Updated 7 years ago
- Browser extension that complements the PhishDetect service☆21Updated last year
- Binarly SDK v1☆13Updated 7 years ago