cert-se / megatron-java
Megatron - A System for Abuse- and Incident Handling
☆44Updated 7 years ago
Alternatives and similar repositories for megatron-java:
Users that are interested in megatron-java are comparing it to the libraries listed below
- Cyber Intel Management☆48Updated 7 years ago
- Passive DNS V2☆62Updated 10 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆37Updated 5 months ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆41Updated 6 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆41Updated 12 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- Frontend for Codex Gigas☆21Updated 8 years ago
- Yara intergrated into BurpSuite☆46Updated 8 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27Updated 3 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Updated 7 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆79Updated 9 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Automated memory forensics analysis☆33Updated 5 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- IntelMQ command line tool to process events and send out email notifications.☆9Updated last week
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago