hiro4848 / sphinxLinks
☆16Updated 10 years ago
Alternatives and similar repositories for sphinx
Users that are interested in sphinx are comparing it to the libraries listed below
Sorting:
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Updated 11 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 9 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 10 years ago
- A Python library for being a CND Batman....☆35Updated 10 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Cli interface to threatcrowd.org☆20Updated 8 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 4 years ago
- SANS Hunting on the Cheap☆36Updated 9 years ago
- Threat Intelligence distribution☆31Updated 9 years ago
- Harbinger Threat Intelligence☆83Updated 10 years ago
- Docker container for MISP☆96Updated 7 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Updated 8 years ago
- ☆64Updated 3 years ago
- Python IOC Editor☆64Updated 10 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated 11 months ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 9 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- Some IR notes☆73Updated 9 years ago
- Help summarize a PCAP file☆33Updated 13 years ago
- Queries to parse sysmon event log file with microsoft logparser☆56Updated 10 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- ☆37Updated 8 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 7 years ago
- Hunting IOCs all day every day...☆87Updated 2 years ago
- Simple Microsoft Windows sessions event logs visualization☆155Updated 3 years ago
- Cyber Intel Management☆50Updated 7 years ago