cudeso / host-enrichLinks
Enrich a host with open source security information
☆27Updated 9 years ago
Alternatives and similar repositories for host-enrich
Users that are interested in host-enrich are comparing it to the libraries listed below
Sorting:
- Harbinger Threat Intelligence☆82Updated 9 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆41Updated 8 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 8 years ago
- A collection of Bro scripts I've written☆40Updated 9 years ago
- This is a script module for Bro that encapsulates and detects activity related to the Mandiant APT1 report.☆47Updated 11 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 7 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆70Updated 6 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Updated 9 years ago
- Cyber Intel Management☆48Updated 7 years ago
- Python API for URL Query☆35Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 7 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆80Updated 9 years ago
- Use OpenDNS's investigate API to find newly observed domains which match a brand or string☆17Updated 8 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 9 years ago
- ☆22Updated 7 years ago
- ☆38Updated 6 years ago
- Some IR notes☆73Updated 8 years ago
- ☆24Updated 9 years ago