Megatron - A System for Abuse- and Incident Handling
☆45Mar 29, 2017Updated 9 years ago
Alternatives and similar repositories for megatron-java
Users that are interested in megatron-java are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework for receiving and redistributing abuse feeds☆126Sep 27, 2019Updated 6 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Limit USB devices plugged to a linux host☆12Feb 12, 2018Updated 8 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A web-based tool to assist the work of the intuitive threat analysts.☆114Feb 9, 2019Updated 7 years ago
- Plugin based information gathering library☆28May 4, 2023Updated 2 years ago
- Ego is Funtoo's configuration and management meta-tool.☆15May 26, 2023Updated 2 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- Wireless Forensics Framework In Python☆20Jan 29, 2017Updated 9 years ago
- Home for TRANSITS materials☆25Jul 24, 2024Updated last year
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- DNSDB query scripts☆75Jan 23, 2020Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Threat Analysis, Reconnaissance, and Data Intelligence System☆129Aug 28, 2015Updated 10 years ago
- ☆14May 30, 2018Updated 7 years ago
- Cyber Intel Management☆50Jan 25, 2018Updated 8 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated last month
- appland client☆19Jul 30, 2015Updated 10 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Web interface to IntelMQ☆10Mar 26, 2026Updated 2 weeks ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆150Jun 3, 2014Updated 11 years ago
- SSH Multipot☆24Apr 30, 2018Updated 7 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- STIX Visualization Tool☆110Jul 13, 2018Updated 7 years ago
- Threat Intelligence APIs☆281Apr 2, 2026Updated last week
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CARET - A tool for viewing cyber analytic relationships☆57Jan 15, 2020Updated 6 years ago
- A Python library for handling TAXII Messages invoking TAXII Services.☆73Apr 21, 2021Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 7 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- IMEI generator used in Huawei modified firmware☆13May 16, 2022Updated 3 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago