☆50Aug 11, 2023Updated 2 years ago
Alternatives and similar repositories for fireeye-python
Users that are interested in fireeye-python are comparing it to the libraries listed below
Sorting:
- HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physic…☆86Jun 27, 2024Updated last year
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- general purpose and malware specific analysis tools☆101Oct 22, 2015Updated 10 years ago
- ☆134Jun 11, 2021Updated 4 years ago
- Parses the FireEye HX .mans triage collections and sends them to ElasticSearch☆17Feb 17, 2023Updated 3 years ago
- The User Interface for GoCrack☆88Mar 11, 2026Updated last week
- ☆398Updated this week
- OWASP Foundation Web Respository☆15Mar 7, 2026Updated last week
- Provides access to libhashcat☆31Apr 6, 2024Updated last year
- SUNBURST DGA decoder☆11Dec 23, 2020Updated 5 years ago
- This project is a lightweight wrapper for interacting with WMI using python/ctypes☆38Apr 6, 2019Updated 6 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865☆22Mar 5, 2021Updated 5 years ago
- ☆44Feb 27, 2017Updated 9 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- ☆10Jan 22, 2025Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Data to test capa's code and rules.☆47Feb 17, 2026Updated last month
- ☆24Aug 30, 2019Updated 6 years ago
- ShadowBroker Tools Decrypted☆14Apr 14, 2017Updated 8 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- ☆216Mar 9, 2026Updated last week
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆22Jun 6, 2017Updated 8 years ago
- Lockheed Martin developed utility to compare two CycloneDX SBOMs☆19Oct 21, 2021Updated 4 years ago
- ☆44Jul 11, 2025Updated 8 months ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- Resolves DLL API entrypoints for a process w/ remote query capabilities.☆58Jun 23, 2017Updated 8 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,303Jun 1, 2023Updated 2 years ago
- EmailScanner is an integration application in python that uses `exchangelib` to process mail items in Microsoft exchange.☆12Apr 9, 2019Updated 6 years ago
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- Modules created by Nettitude for Metasploit☆12Jun 20, 2018Updated 7 years ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆14Jun 13, 2023Updated 2 years ago
- ☆33Feb 23, 2015Updated 11 years ago
- GeoLogonalyzer is a utility to analyze remote access logs for anomalies such as travel feasibility and data center sources.☆196Aug 12, 2024Updated last year
- Script to install and configure common programs in a new iSH Alpine Linux filesystem☆14Jan 6, 2022Updated 4 years ago