docbleach / DocBleachLinks
Sanitising your documents, one threat at a time. — Content Disarm & Reconstruction Software
☆153Updated last year
Alternatives and similar repositories for DocBleach
Users that are interested in DocBleach are comparing it to the libraries listed below
Sorting:
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆143Updated 2 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆272Updated 2 years ago
- A modular Python application to pull intelligence about malicious files☆122Updated 4 years ago
- CRITs Services Collection☆184Updated 4 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆143Updated last month
- Threat Feed Aggregation, Made Easy☆168Updated 5 years ago
- Python API wrapper for the Joe Sandbox API.☆67Updated last year
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆160Updated 2 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆155Updated 5 years ago
- A tool designed for consistent and safe capture of off network web resources.☆38Updated 8 years ago
- Docker container for MISP☆96Updated 7 years ago
- BASS - BASS Automated Signature Synthesizer☆176Updated 6 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- A framework for receiving and redistributing abuse feeds☆124Updated 5 years ago
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆141Updated 2 years ago
- Checks with NSRL RDS servers looking for for hash matches☆114Updated 4 years ago
- a low-interaction honeypot☆94Updated 8 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆81Updated 9 years ago
- CrowdStrike Feed Management System. CrowdFMS is a framework for automating collection and processing of samples from VirusTotal, by lever…☆128Updated 6 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- An open source framework for enterprise level automated analysis.☆395Updated 3 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 7 years ago
- Automated Docker MISP container - Malware Information Sharing Platform and Threat Sharing☆175Updated 4 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆86Updated 4 months ago
- Simple Microsoft Windows sessions event logs visualization☆152Updated 3 years ago
- GeoLogonalyzer is a utility to analyze remote access logs for anomalies such as travel feasibility and data center sources.☆196Updated 11 months ago
- Windows Live Artifacts Acquisition Script☆188Updated 3 years ago
- Sandia Cyber Omni Tracker (SCOT)☆248Updated 8 months ago