ccdcoe / Frankencoding
You're busted!
☆25Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for Frankencoding
- CyCAT.org taxonomies☆14Updated 3 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated last year
- ☆23Updated 4 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15Updated last year
- ☆15Updated 6 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆83Updated 5 years ago
- Busted. With duct tape, spit and tears. Brought to you by beer.☆12Updated 3 years ago
- Specifications used in the MISP project including MISP core format☆46Updated last month
- CyCAT.org API back-end server including crawlers☆30Updated last year
- ☆28Updated 7 years ago
- Passive DNS Common Output Format☆36Updated 2 months ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 6 years ago
- server for indexing and querying passive DNS observations☆44Updated 10 months ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- Python script to automatically create sigma rules from The hive observables☆23Updated 5 years ago
- Implementation of Context-Graph algorithms for graph enrichment and querying.☆24Updated 9 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Updated 4 years ago
- ☆12Updated 5 years ago
- A collection of typical false positive indicators☆54Updated 3 years ago
- Plugin for Zeek/Bro which provides http2 decoder/analyzer☆30Updated 5 months ago
- Zeek support for Community ID flow hashing.☆34Updated last year
- Python bindings for Yeti's API☆18Updated last year
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆19Updated this week
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Best practices in threat intelligence☆46Updated 2 years ago