cloudtracer / text2cpe
Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results
☆17Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for text2cpe
- ☆22Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- Yara intergrated into BurpSuite☆46Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆65Updated 5 years ago
- A simple Nessus results viewer☆49Updated 11 years ago
- Simple DDE object detector☆55Updated 6 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Command-line Interface for Binar.ly☆37Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago
- Cyber Intel Management☆46Updated 6 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆49Updated 6 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 5 years ago
- List of scripts used for malware analysis☆15Updated 9 years ago
- API functions for Malware Research☆35Updated 5 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆22Updated last year
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 7 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 5 years ago
- Some rules, scripts of some use to us☆9Updated 3 weeks ago
- BlackHat Europe 2017 Slides☆26Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Providing timelines based on OSINT Reports☆32Updated last year
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 7 years ago