cert-se / megatron-javaLinks
Megatron - A System for Abuse- and Incident Handling
☆45Updated 8 years ago
Alternatives and similar repositories for megatron-java
Users that are interested in megatron-java are comparing it to the libraries listed below
Sorting:
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Updated 7 years ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Cyber Intel Management☆50Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Parses Java Cache IDX files☆40Updated 7 years ago
- Normalizer for honeypot data.☆46Updated 10 years ago
- A warehouse for your malware☆135Updated last month
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Updated last year
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated last year
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 6 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27Updated 4 years ago
- integrating bro into yara☆33Updated 11 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- Passive DNS V2☆60Updated 11 years ago
- Phishing e-mail repository☆36Updated 5 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Passive Network Audit Framework☆32Updated 7 years ago
- A collection of infosec related scripts and information.☆53Updated last year
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 8 years ago
- Mass static malware analysis tool☆94Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago