UTSA-cyber / sceadanLinks
Systematic Classification Engine for Advanced Data ANalysis
☆22Updated 8 years ago
Alternatives and similar repositories for sceadan
Users that are interested in sceadan are comparing it to the libraries listed below
Sorting:
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆16Updated last year
- Simple NGram Fast Indexer & Searcher☆37Updated 2 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Updated 6 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Parallel ssdeep clustering kit☆20Updated 7 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆77Updated last year
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Updated 6 months ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- You're busted!☆26Updated 5 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Updated 8 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 4 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- ☆14Updated 7 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- pcapdj - dispatch pcap files☆46Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated 2 years ago
- A simple python library to assist in working with cpes☆19Updated last year
- Network Defender Toolkit☆18Updated 12 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- ☆19Updated 6 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11Updated 6 years ago
- Plugins written for CVE-Search☆26Updated 4 years ago
- "Fuzzy matching" for SQLite databases☆30Updated 5 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Scalable Binary Data Extraction in Hadoop☆143Updated 11 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆14Updated 2 years ago