A python library for building and using hash databases.
☆22Feb 8, 2023Updated 3 years ago
Alternatives and similar repositories for pyhashdd
Users that are interested in pyhashdd are comparing it to the libraries listed below
Sorting:
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Realtime and Online Model Development Framework☆27May 18, 2017Updated 8 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Squash adds an invisible memory layer to your browser, compressing every click into portable context for any AI agent☆30Sep 22, 2025Updated 5 months ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated last month
- Parallel ssdeep clustering kit☆20Dec 24, 2017Updated 8 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Dec 5, 2023Updated 2 years ago
- ip6.arpa scanner☆33Dec 19, 2016Updated 9 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- IPv6 network walking utilities (ip6dnswalk, ip6dnshide)☆22May 27, 2014Updated 11 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 5 months ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- A script to change authorship to ODT and DOCX comments, redlines and whatnot.☆34Feb 18, 2026Updated last week
- Migrate team-managed project issues between two JIRA Cloud accounts☆12Nov 12, 2024Updated last year
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Jan 5, 2019Updated 7 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- Global Security Database Project☆28Mar 4, 2023Updated 2 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- Simple NGram Fast Indexer & Searcher☆37Jan 6, 2023Updated 3 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Parsing of YARA rules into AST and building new rulesets in C++.☆129Jan 25, 2026Updated last month
- DeFacto - Demonstrations and Feedback for improving factual consistency of text summarization☆30Dec 19, 2022Updated 3 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 7 years ago
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- Mass DNS resolution tool☆37Jan 1, 2026Updated last month
- Repository with examples of how to solve a tsp with pso, aco, ga and integer programming☆10Oct 9, 2024Updated last year
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- QARMA block cipher in C☆31Sep 10, 2022Updated 3 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- Create an entire YARA rule via Python? Whhhhhhaatttt?☆74Jan 12, 2019Updated 7 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Mar 24, 2017Updated 8 years ago
- A rewrite of mactime, a bodyfile reader☆39Aug 5, 2024Updated last year
- TK's Tree Style Tab Outliner -- Organize your online life and sync between browsers, using your own private server☆20Updated this week