Python IOC Editor
☆65Mar 10, 2015Updated 10 years ago
Alternatives and similar repositories for PyIOCe
Users that are interested in PyIOCe are comparing it to the libraries listed below
Sorting:
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- ☆207May 3, 2023Updated 2 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- A Python DNS crawler to find identical domain names under different TLDs.☆25May 18, 2019Updated 6 years ago
- ☆16Apr 16, 2017Updated 8 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 6 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆473Jan 19, 2019Updated 7 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Batch scripts to capture volatile and log information from a target system☆21Oct 9, 2014Updated 11 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Page File analysis tools.☆131Dec 3, 2015Updated 10 years ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- Hunting IOCs all day every day...☆87Sep 26, 2023Updated 2 years ago
- Defanged Indicator of Compromise (IOC) Extractor.☆567Aug 28, 2024Updated last year
- A DFVFS Backed Forensic Viewer☆42Apr 13, 2020Updated 5 years ago
- AppCompatCache (shimcache) parser. Supports Windows 7 (x86 and x64), Windows 8.x, and Windows 10, and Windows 11☆129Jan 12, 2025Updated last year
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- EVTXtract recovers and reconstructs fragments of EVTX log files from raw binary data, including unallocated space and memory images.☆208Mar 12, 2025Updated 11 months ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- ☆134Jun 11, 2021Updated 4 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- STIX Visualization Tool☆110Jul 13, 2018Updated 7 years ago
- ☆39Jun 28, 2019Updated 6 years ago
- Volatility plugins created by the author☆44Oct 2, 2015Updated 10 years ago
- Threat Intelligence APIs☆281Aug 14, 2023Updated 2 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago