A framework for receiving and redistributing abuse feeds
☆125Sep 27, 2019Updated 6 years ago
Alternatives and similar repositories for abusehelper
Users that are interested in abusehelper are comparing it to the libraries listed below
Sorting:
- A Python 2.x library for asynchronous tasks☆13May 8, 2019Updated 6 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,113Feb 14, 2026Updated 2 weeks ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- Malware/IOC ingestion and processing engine☆109Nov 20, 2018Updated 7 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Threat Feed Aggregation, Made Easy☆169Jul 13, 2020Updated 5 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds☆177Oct 19, 2015Updated 10 years ago
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year or…☆19Jun 20, 2021Updated 4 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- Mass static malware analysis tool☆94Feb 13, 2022Updated 4 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Feb 9, 2019Updated 7 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Malware static analysis framework☆185Apr 1, 2020Updated 5 years ago
- Automated handling of data feeds for security teams☆147Dec 31, 2025Updated 2 months ago
- CIFv3 DeploymentKit☆64Apr 14, 2020Updated 5 years ago
- A modular Python application to collect intelligence for malicious hosts.☆274Apr 13, 2021Updated 4 years ago
- Python OpenIOC Editor☆18Dec 28, 2015Updated 10 years ago
- Threat Intelligence APIs☆280Aug 14, 2023Updated 2 years ago
- Credential Phish Analysis and Automation☆98Aug 22, 2018Updated 7 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆556May 9, 2023Updated 2 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Validate STIX and CybOX XML documents☆26Feb 16, 2024Updated 2 years ago
- Android Connections Forensics☆33Dec 15, 2015Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- IntelMQ Manager is a graphical interface to manage configurations for IntelMQ framework.☆108Dec 3, 2025Updated 3 months ago
- Feed for verious malicious IPs such as malware and botnets☆12Jun 20, 2016Updated 9 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago