cert-se / megatron-javaLinks
Megatron - A System for Abuse- and Incident Handling
☆44Updated 8 years ago
Alternatives and similar repositories for megatron-java
Users that are interested in megatron-java are comparing it to the libraries listed below
Sorting:
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- ☆85Updated 12 years ago
- A warehouse for your malware☆133Updated 12 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 11 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Malware/IOC ingestion and processing engine☆107Updated 6 years ago
- ☆52Updated 7 years ago
- Cyber Intel Management☆49Updated 7 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- Passive DNS V2☆60Updated 11 years ago
- Process HTTP Pcaps With YARA☆106Updated 12 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- ☆22Updated 7 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- Network sinkhole for isolated malware analysis☆40Updated 7 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated 10 months ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆63Updated 9 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated last year
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- Phishing e-mail repository☆38Updated 5 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Passive Network Audit Framework☆32Updated 7 years ago