cloudtracer / text2cpe
Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results
☆17Updated 5 years ago
Related projects: ⓘ
- ☆21Updated 6 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆65Updated 5 years ago
- ☆39Updated this week
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆18Updated 7 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆39Updated 5 years ago
- Parses Java Cache IDX files☆39Updated 6 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Cyber Intel Management☆46Updated 6 years ago
- Command-line Interface for Binar.ly☆37Updated 7 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆11Updated 3 years ago
- A simple Nessus results viewer☆49Updated 11 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆22Updated 11 months ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆40Updated 4 years ago
- Detect malicious domain, Blablablablabla☆26Updated 7 years ago
- Various Modules & Scripts for use with Viper Framework☆27Updated 5 years ago
- ☆27Updated this week
- ☆16Updated 9 years ago
- ☆18Updated 6 years ago
- List of scripts used for malware analysis☆15Updated 9 years ago
- Historical Observations of Actionable Reputation Data☆13Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- ☆22Updated this week
- Providing timelines based on OSINT Reports☆32Updated last year
- Honeypot log processor to create OTX Pulse entries☆29Updated 8 months ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 5 years ago
- Six Degrees of Domain Admin☆15Updated 6 years ago
- Frontend for Codex Gigas☆21Updated 7 years ago
- Simple DDE object detector☆55Updated 6 years ago