dirtbags / fluffyLinks
Tools for Network Archaeology (internet protocol analysis)
☆29Updated last month
Alternatives and similar repositories for fluffy
Users that are interested in fluffy are comparing it to the libraries listed below
Sorting:
- ☆14Updated 7 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- ☆52Updated 7 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- ☆25Updated 3 years ago
- CyCAT.org taxonomies☆15Updated 4 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆19Updated 3 months ago
- CLI tool to analyze PE files☆88Updated last year
- Client library for the mwdb service by CERT Polska.☆41Updated 3 weeks ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆42Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Updated last week
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 4 years ago
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Updated 2 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- SightingDB is a database for Sightings☆22Updated 2 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- Tools to assist in forensicating docker☆84Updated 7 months ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- A collection of typical false positive indicators☆55Updated 4 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 6 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated this week
- Frontend for MalShare.com☆17Updated 2 months ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago