b-fullam / Automating-VirusTotal-APIv3-for-IPs-and-URLs
Automating VirusTotal's API v3 for IP address and URL analysis w/HTML Reporting. Python script that functions like a CLI tool to interact programmatically with VirusTotal API v3.
☆44Updated 2 years ago
Alternatives and similar repositories for Automating-VirusTotal-APIv3-for-IPs-and-URLs:
Users that are interested in Automating-VirusTotal-APIv3-for-IPs-and-URLs are comparing it to the libraries listed below
- OSSEM Data Dictionaries☆59Updated 2 months ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- Submits multiple domains to VirusTotal API☆60Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆70Updated last month
- OSSEM Common Data Model☆55Updated 2 years ago
- Python API for interacting with sigma rules.☆50Updated 2 years ago
- Notes on managing and coordinating the response to major cyber incidents☆40Updated 4 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated 11 months ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆31Updated last year
- Python library for threat intelligence☆85Updated 2 months ago
- Workflows for Shuffle☆21Updated 2 years ago
- Digital Forensics Artifacts Knowledge Base☆80Updated 10 months ago
- Actionable data for Security Operations☆18Updated 3 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated 11 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated 11 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆44Updated 3 weeks ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Fast IOC and YARA Scanner☆79Updated 5 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆69Updated 4 years ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- The FASTEST way to consume threat intel.☆68Updated last year
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Full of public notes and Utilities☆98Updated last month
- ☆16Updated 4 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆71Updated 4 months ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆86Updated last year
- Convert Sigma rules to LogRhythm searches☆20Updated 3 years ago