The Fastest way to consume Threat Intel
☆26Apr 30, 2022Updated 3 years ago
Alternatives and similar repositories for verbose-robot
Users that are interested in verbose-robot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CIF v3 -- the fastest way to consume threat intelligence☆183Apr 20, 2023Updated 2 years ago
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated last month
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- The FASTEST way to consume threat intel.☆69May 10, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- Top 1 Millon ranked websites and top level domains (TLD)☆11Feb 4, 2026Updated last month
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Website crawler with YARA detection☆89Aug 20, 2023Updated 2 years ago
- ☆14Dec 11, 2025Updated 3 months ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Zeek package to detect Zerologon☆11Nov 10, 2021Updated 4 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- PiDoors - Wigand Access Control System using Raspberry Pi☆17Mar 20, 2026Updated last week
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- Real Time Threat Monitoring Tool☆115Nov 16, 2022Updated 3 years ago
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Sep 29, 2021Updated 4 years ago
- A toolkit for Security Researchers☆125Sep 2, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Threat Intelligence APIs☆281Aug 14, 2023Updated 2 years ago
- Don't Just Search OSINT. Sweep It.☆313Jan 26, 2021Updated 5 years ago
- ☆10Oct 30, 2023Updated 2 years ago
- Python 3 Google Safe Browsing library☆28Mar 27, 2025Updated last year
- Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)☆16Feb 2, 2019Updated 7 years ago
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Oct 7, 2015Updated 10 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- Report Generation from the Carbon Black REST API☆15Mar 24, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆15Apr 28, 2017Updated 8 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆170Sep 27, 2022Updated 3 years ago
- Phishing websites are fraudulent sites that impersonate a trusted party to gain access to sensitive information of an individual person o…☆14May 1, 2020Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 4 years ago
- The FASTEST way to parse Email☆18Dec 24, 2021Updated 4 years ago
- Packer.io Scripts to build the SIFT VM(s)☆10Aug 29, 2020Updated 5 years ago
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 10 years ago