adulau / napkin-text-analysis
Napkin is a simple tool to produce statistical analysis of a text
☆12Updated 11 months ago
Alternatives and similar repositories for napkin-text-analysis:
Users that are interested in napkin-text-analysis are comparing it to the libraries listed below
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 9 months ago
- certstream + analytics☆10Updated 5 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- Python CLI and module for CIRCL hash lookup☆12Updated 2 weeks ago
- ☆24Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Updated 3 weeks ago
- Automate the regular transfer of AIS data into a MISP Server☆7Updated 8 months ago
- External twitter feeder for AIL framework☆17Updated last year
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- A privacy-aware exchange module to securely and privately share your indicators☆13Updated 7 years ago
- Similarius is a Python library to compare web page and evaluate the level of similarity.☆18Updated last week
- Useful commands for infosec☆29Updated 2 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Updated 8 years ago
- ☆14Updated 6 years ago
- ☆15Updated 6 years ago
- CERTITUDE - A python package to classify malicious URLs☆20Updated 2 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated 2 weeks ago
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated 4 months ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆30Updated last year
- Virustotal Data to Timesketch☆17Updated 5 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆43Updated 2 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11Updated 5 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆39Updated 3 weeks ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year