blackhole-em / cuckoo2STIXView external linksLinks
☆37May 21, 2014Updated 11 years ago
Alternatives and similar repositories for cuckoo2STIX
Users that are interested in cuckoo2STIX are comparing it to the libraries listed below
Sorting:
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- Dockerized Cuckoo build☆10Aug 3, 2016Updated 9 years ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 8 years ago
- Web based Manager for Yara Rules☆58Mar 9, 2020Updated 5 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- A warehouse for your malware☆20Feb 25, 2013Updated 12 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Advices to look for malicious software on your devices☆17May 6, 2020Updated 5 years ago
- dns logger for passive dns collection☆42May 27, 2012Updated 13 years ago
- A streamlined way to create STIX documents!☆32Apr 30, 2014Updated 11 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Malware.lu tools☆63Oct 28, 2013Updated 12 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- ☆17Nov 12, 2017Updated 8 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- Hunting IOCs all day every day...☆87Sep 26, 2023Updated 2 years ago
- Modified edition of cuckoo community modules☆50May 12, 2017Updated 8 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- yara rules for cryptography detection☆30Apr 28, 2014Updated 11 years ago
- ☆19Jul 24, 2021Updated 4 years ago
- Commandline utility to interact with the Malpedia service☆22Dec 5, 2025Updated 2 months ago
- Parse Yara rules and operate over them more easily.☆52Jan 7, 2019Updated 7 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- Path bookmarking for bash. I use this extensively throughout my day.☆23Apr 22, 2020Updated 5 years ago
- A script to reverse-engineer anti-virus signatures☆32Mar 20, 2013Updated 12 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- ⛓ Blockchain parser for Python☆28Dec 27, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/malware-lu☆57May 21, 2019Updated 6 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- threat language parser☆60Apr 20, 2015Updated 10 years ago