hiro4848 / sphinxLinks
☆16Updated 10 years ago
Alternatives and similar repositories for sphinx
Users that are interested in sphinx are comparing it to the libraries listed below
Sorting:
- Home to the ActorTrackr source code☆24Updated 8 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 8 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 8 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- Some IR notes☆73Updated 9 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 9 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- Detect Phishing with Bro IDS☆19Updated 8 years ago
- Various tools and scripts☆43Updated 2 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆110Updated 7 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated 9 months ago
- Help summarize a PCAP file☆33Updated 13 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- Cyber Intel Management☆49Updated 7 years ago
- Updates the Emerging Threats open ruleset for Suricata☆10Updated 10 years ago
- Hunting IOCs all day every day...☆86Updated 2 years ago
- SANS Hunting on the Cheap☆35Updated 9 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆41Updated 13 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆82Updated 9 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- A framework for receiving and redistributing abuse feeds☆124Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 6 years ago