docbleach / DocBleachLinks
Sanitising your documents, one threat at a time. — Content Disarm & Reconstruction Software
☆156Updated last year
Alternatives and similar repositories for DocBleach
Users that are interested in DocBleach are comparing it to the libraries listed below
Sorting:
- Malware/IOC ingestion and processing engine☆106Updated 6 years ago
- Docker container for MISP☆96Updated 7 years ago
- A framework for receiving and redistributing abuse feeds☆124Updated 5 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year
- URL Abuse - A Versatile Software for URL review, analysis and black-list reporting☆144Updated 2 years ago
- A modular Python application to pull intelligence about malicious files☆122Updated 4 years ago
- A tool designed for consistent and safe capture of off network web resources.☆38Updated 8 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 9 years ago
- A Yara rule generator for finding related samples and hunting☆160Updated 2 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago
- a low-interaction honeypot☆94Updated 8 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Checks with NSRL RDS servers looking for for hash matches☆114Updated 4 years ago
- Static analysis tools for Microsoft Office Open XML files and documents☆70Updated 7 years ago
- Potiron - Normalize, Index and Visualize Network Capture☆88Updated 6 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- BASS - BASS Automated Signature Synthesizer☆176Updated 6 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Updated 3 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- A warehouse for your malware☆133Updated 12 years ago
- GeoLogonalyzer is a utility to analyze remote access logs for anomalies such as travel feasibility and data center sources.☆196Updated 11 months ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆82Updated 9 years ago
- An open source framework for enterprise level automated analysis.☆395Updated 3 years ago
- Django web interface for managing Yara rules☆193Updated 7 years ago
- Windows Live Artifacts Acquisition Script☆189Updated 3 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆273Updated 2 years ago
- 1-Click push forensics evidence to the cloud☆141Updated last year