gamelinux / echidnaLinks
Network Security Monitoring Framework
☆48Updated 13 years ago
Alternatives and similar repositories for echidna
Users that are interested in echidna are comparing it to the libraries listed below
Sorting:
- Malware Analysis Zoo☆25Updated 8 years ago
- A Network Inspection Tool☆82Updated 8 years ago
- ☆85Updated 12 years ago
- Local and Remote Maltego Rapid Transform Development Framework☆104Updated 9 years ago
- DEPRECATED USE v3!☆59Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- integrating bro into yara☆33Updated 10 years ago
- Various Bro scripts☆37Updated 11 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 11 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Workbench: A scalable python framework for security research and development teams.☆92Updated 5 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- ☆27Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 10 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Passive DNS V2☆60Updated 11 years ago
- Python API for URL Query☆36Updated 9 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 8 years ago
- REST API based malware repository (abandoned)☆107Updated 10 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Updated 6 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Compare multiple log formats against malware reputation lists.☆88Updated 8 years ago
- Alienvault Labs Projects Random Stuff☆79Updated 12 years ago