demisto / parse-emails
☆15Updated 2 weeks ago
Alternatives and similar repositories for parse-emails:
Users that are interested in parse-emails are comparing it to the libraries listed below
- Virustotal Data to Timesketch☆17Updated 5 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated 7 months ago
- Python module to use the MISP Taxonomies☆29Updated last month
- ☆24Updated 2 years ago
- Incident Response Report Using GitHub-Sphinx☆19Updated 5 years ago
- STIX 2.1 Data Modeling Tool☆25Updated 7 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Updated 4 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated 2 weeks ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆23Updated 3 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆41Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated 11 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 4 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆57Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- ☆18Updated 6 years ago
- Links to malware-related YARA rules☆14Updated 2 years ago
- ☆33Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- ☆11Updated 4 years ago
- Convert Sigma rules to LogRhythm searches☆20Updated 2 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- Specifications used in the MISP project including MISP core format☆51Updated last month
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆26Updated 6 years ago
- A tool to spread canary credentials in your organisation☆8Updated 3 years ago