Extract useful information from a Twitter account.
☆35Jan 1, 2014Updated 12 years ago
Alternatives and similar repositories for twanalyze
Users that are interested in twanalyze are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- The FASTEST way to parse Email☆18Dec 24, 2021Updated 4 years ago
- Hunting IOCs all day every day...☆88Sep 26, 2023Updated 2 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 4 months ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Generate TikZ graphics from tcpdump/Wireshark captures☆20Feb 2, 2013Updated 13 years ago
- CybOX Tools and Scripts☆44Nov 25, 2013Updated 12 years ago
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- Parse Yara rules and operate over them more easily.☆51Jan 7, 2019Updated 7 years ago
- A Rekall interactive document for a Memory Analysis workshop/course.☆43Mar 8, 2017Updated 9 years ago
- Small scripts for doing repeatable tasks☆25Apr 30, 2022Updated 3 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆28Jan 27, 2017Updated 9 years ago
- ☆17Mar 22, 2018Updated 8 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- API Tools☆27Apr 18, 2016Updated 9 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Dumps TeamViewer ID,Password and account settings from a running TeamViewer instance by enumerating child windows.☆45Sep 5, 2022Updated 3 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Sep 13, 2017Updated 8 years ago
- ☆37Feb 3, 2017Updated 9 years ago
- Add iOS & Android device and push notification support in your Rails application.☆12Mar 6, 2017Updated 9 years ago
- Python version of OWASP's DirBuster Application.☆29Dec 18, 2014Updated 11 years ago
- On-the-fly decryption proxy for MikroTik RouterOS WebFig sessions.☆14Oct 8, 2018Updated 7 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- Enrich a host with open source security information☆27Oct 4, 2015Updated 10 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Open Source INTelligence☆24Apr 19, 2020Updated 5 years ago