Yelp / amira
AMIRA: Automated Malware Incident Response & Analysis
☆150Updated last year
Related projects ⓘ
Alternatives and complementary repositories for amira
- Threat Analysis, Reconnaissance, and Data Intelligence System☆121Updated 9 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- Harbinger Threat Intelligence☆82Updated 8 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 6 years ago
- Tools for the Computer Incident Response Team☆142Updated 7 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆77Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 5 years ago
- A warehouse for your malware☆133Updated 11 years ago
- ☆139Updated 5 months ago
- Threat Intelligence APIs☆274Updated last year
- Cyber Intel Management☆45Updated 6 years ago
- Docker container for MISP☆96Updated 6 years ago
- Malware/IOC ingestion and processing engine☆103Updated 5 years ago
- A modular Python application to pull intelligence about malicious files☆118Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- Some IR notes☆73Updated 8 years ago
- A Framework for managing Cyber Threat Intelligence.☆5Updated 6 years ago
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆138Updated 5 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆107Updated 6 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆80Updated 7 years ago
- A toolkit for Security Researchers☆124Updated 5 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆67Updated 7 years ago