b-fullam / Automating-VirusTotal-APIv3-for-IPs-and-URLsLinks
Automating VirusTotal's API v3 for IP address and URL analysis w/HTML Reporting. Python script that functions like a CLI tool to interact programmatically with VirusTotal API v3.
☆48Updated 2 years ago
Alternatives and similar repositories for Automating-VirusTotal-APIv3-for-IPs-and-URLs
Users that are interested in Automating-VirusTotal-APIv3-for-IPs-and-URLs are comparing it to the libraries listed below
Sorting:
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆71Updated 2 years ago
- an awesome list of active defense resources☆124Updated 5 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 3 months ago
- Python API for interacting with sigma rules.☆55Updated 3 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 2 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆57Updated 3 years ago
- OSSEM Data Dictionaries☆62Updated 6 months ago
- A curated list of KAPE-related resources☆172Updated 3 months ago
- Resources, tools and utilities about Threat Intelligence☆70Updated 2 years ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated last week
- Fast IOC and YARA Scanner☆81Updated 5 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆136Updated last year
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆52Updated 3 years ago
- Practical Threat Detection Engineering, Published by Packt☆76Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- ☆52Updated 3 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆26Updated 9 months ago
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- A collection of tips for using MISP.☆74Updated 7 months ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆89Updated last year
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆111Updated 2 years ago
- Documentation site for Velociraptor☆50Updated last week
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆84Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆122Updated 4 years ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆73Updated 4 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 2 weeks ago
- Digital Forensics Artifacts Knowledge Base☆85Updated last year