BTG's purpose is to make fast and efficient search on IOC
☆71Nov 27, 2018Updated 7 years ago
Alternatives and similar repositories for BTG
Users that are interested in BTG are comparing it to the libraries listed below
Sorting:
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- ☆54Sep 14, 2018Updated 7 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Nov 3, 2025Updated 3 months ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Apr 3, 2020Updated 5 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- Warning: These are REAL, EVIL executables.. download at your own risk, submit your own.☆18Jul 13, 2020Updated 5 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Tools and library to manipulate EFI variables.☆10Updated this week
- ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access and man…☆302Apr 24, 2020Updated 5 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- Tools to interact with a certificate transparency server☆23Aug 31, 2015Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- BASS - BASS Automated Signature Synthesizer☆179Sep 19, 2018Updated 7 years ago
- Fancy Bear Source Code☆262Jan 9, 2017Updated 9 years ago
- Cosa Nostra, a FOSS graph based malware clusterization toolkit.☆231Jan 18, 2024Updated 2 years ago
- CARET - A tool for viewing cyber analytic relationships☆57Jan 15, 2020Updated 6 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆277Mar 20, 2019Updated 6 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago