A framework for receiving and redistributing abuse feeds
☆126Sep 27, 2019Updated 6 years ago
Alternatives and similar repositories for abusehelper
Users that are interested in abusehelper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python 2.x library for asynchronous tasks☆13May 8, 2019Updated 6 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 9 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,118Feb 14, 2026Updated 2 months ago
- Malware/IOC ingestion and processing engine☆110Nov 20, 2018Updated 7 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- Web interface to IntelMQ☆10Mar 26, 2026Updated 2 weeks ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Threat Feed Aggregation, Made Easy☆169Jul 13, 2020Updated 5 years ago
- Validate STIX and CybOX XML documents☆26Feb 16, 2024Updated 2 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Mass static malware analysis tool☆94Apr 4, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 10 years ago
- Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds☆178Oct 19, 2015Updated 10 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- A web-based tool to assist the work of the intuitive threat analysts.☆114Feb 9, 2019Updated 7 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 11 years ago
- CIFv3 DeploymentKit☆64Apr 14, 2020Updated 6 years ago
- Automated handling of data feeds for security teams☆148Dec 31, 2025Updated 3 months ago
- Flow-based SSH intrusion detection system (NfSen plugin)☆41Dec 10, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A modular Python application to collect intelligence for malicious hosts.☆274Apr 13, 2021Updated 5 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆558May 9, 2023Updated 2 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 15 years ago
- Credential Phish Analysis and Automation☆99Aug 22, 2018Updated 7 years ago
- Threat Intelligence APIs☆282Apr 2, 2026Updated last week
- STIX Visualization Tool☆110Jul 13, 2018Updated 7 years ago
- CuckooML: Machine Learning for Cuckoo Sandbox