Yelp / amira
AMIRA: Automated Malware Incident Response & Analysis
☆151Updated 3 months ago
Alternatives and similar repositories for amira:
Users that are interested in amira are comparing it to the libraries listed below
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- A warehouse for your malware☆134Updated 12 years ago
- The Seeker of IOC☆129Updated 4 years ago
- Some IR notes☆73Updated 8 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated last year
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Tools for the Computer Incident Response Team☆144Updated 8 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- Mystique may be used to discover infection markers that can be used to vaccinate endpoints against malware. It receives as input a malici…☆82Updated 7 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆109Updated 7 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Query and report user logons relations from MS Windows Security Events☆243Updated 6 years ago
- PowerShell No Agent Hunting☆110Updated 7 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- Docker container for MISP☆96Updated 6 years ago
- A collection of infosec related scripts and information.☆53Updated 7 months ago
- Bro scripts to be shared with the community☆109Updated 12 years ago
- Collecting & Hunting for IOCs with gusto and style☆116Updated 6 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- a Malware/Threat Analyst Desktop☆89Updated 9 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 7 years ago
- Differential Analysis of Malware in Memory☆211Updated 8 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 5 years ago
- Malware Repository Framework☆99Updated 7 years ago
- IR-Tools - PowerShell tools for IR☆130Updated 7 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆125Updated 9 years ago
- A framework for receiving and redistributing abuse feeds☆124Updated 5 years ago