docbleach / DocBleachLinks
Sanitising your documents, one threat at a time. — Content Disarm & Reconstruction Software
☆156Updated 2 years ago
Alternatives and similar repositories for DocBleach
Users that are interested in DocBleach are comparing it to the libraries listed below
Sorting:
- a low-interaction honeypot☆95Updated 8 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated 2 years ago
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆148Updated 3 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Updated 10 months ago
- Docker container for MISP☆96Updated 7 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated 2 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- PhishDetect is a library to help identify phishing pages☆109Updated 2 years ago
- Malware/IOC ingestion and processing engine☆109Updated 7 years ago
- A modular Python application to pull intelligence about malicious files☆123Updated 5 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆145Updated last month
- A framework for receiving and redistributing abuse feeds☆125Updated 6 years ago
- Legal, procedural and policies document templates for operating an IRT☆65Updated last year
- Python API wrapper for the Joe Sandbox API.☆68Updated 2 weeks ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- Threat Feed Aggregation, Made Easy☆169Updated 5 years ago
- BASS - BASS Automated Signature Synthesizer☆178Updated 7 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆140Updated 2 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- A warehouse for your malware☆136Updated 2 months ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 3 months ago
- Spam Honeypot with Intelligent Virtual Analyzer☆140Updated 10 months ago
- This project is no longer maintained. There's a successor at https://github.com/zeek/zeek-agent-v2☆124Updated 5 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98Updated 9 years ago
- ☆174Updated 4 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆278Updated 2 years ago
- Checks with NSRL RDS servers looking for for hash matches☆114Updated 4 years ago
- GeoLogonalyzer is a utility to analyze remote access logs for anomalies such as travel feasibility and data center sources.☆196Updated last year
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Updated 6 years ago
- A tool designed for consistent and safe capture of off network web resources.☆39Updated 8 years ago