b-fullam / Automating-VirusTotal-APIv3-for-IPs-and-URLsLinks
Automating VirusTotal's API v3 for IP address and URL analysis w/HTML Reporting. Python script that functions like a CLI tool to interact programmatically with VirusTotal API v3.
☆50Updated 3 years ago
Alternatives and similar repositories for Automating-VirusTotal-APIv3-for-IPs-and-URLs
Users that are interested in Automating-VirusTotal-APIv3-for-IPs-and-URLs are comparing it to the libraries listed below
Sorting:
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 3 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated this week
- an awesome list of active defense resources☆125Updated 5 years ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated last month
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- ☆96Updated 4 months ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆91Updated last year
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated last month
- Dictionary of CTI-related acronyms, terms, and jargon☆144Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆58Updated 3 years ago
- ☆53Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- SigmaHQ pySigma CrowdStrike processing pipeline☆26Updated last month
- Corelight@Home script☆44Updated last year
- Extracts fields from zeek logs, compatible with zeek-cut☆23Updated last year
- Notes on managing and coordinating the response to major cyber incidents☆41Updated 5 years ago
- A collection of tips for using MISP.☆74Updated 9 months ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆25Updated 6 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Actionable data for Security Operations☆19Updated 4 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆39Updated 4 years ago
- Workflows for Shuffle☆23Updated 2 years ago
- ☆72Updated 2 years ago
- Practical Threat Detection Engineering, Published by Packt☆76Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago