cert-lv / pastelyzer
The paste analyzer
☆27Updated 4 years ago
Alternatives and similar repositories for pastelyzer:
Users that are interested in pastelyzer are comparing it to the libraries listed below
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆66Updated last month
- IntelMQ Tutorial and Introductory Documentation☆14Updated 2 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆58Updated 4 years ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Updated 3 years ago
- ☆33Updated 5 years ago
- IntelMQ Manager is a graphical interface to manage configurations for IntelMQ framework.☆105Updated last month
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated 3 months ago
- A rewrite of mactime, a bodyfile reader☆37Updated 9 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Simple yara rule manager☆66Updated 2 years ago
- A streamlined way to create STIX documents!☆32Updated 11 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆88Updated last month
- Scripts for TheHive.☆22Updated 5 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- References for FIRST CTI 2019 Symposium presentation☆22Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Updated 9 months ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 3 years ago
- Analyze binaries collected in VMware Carbon Black EDR against Yara rules.☆37Updated 2 years ago
- SightingDB is a database for Sightings☆22Updated last year
- ☆16Updated last year
- ☆15Updated 2 years ago
- For storing of the volumes☆4Updated 5 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆144Updated 2 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 9 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Bot to create MISP events from data in Slack☆17Updated last year
- A collection of typical false positive indicators☆55Updated 4 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago