hiro4848 / sphinx
☆16Updated 9 years ago
Alternatives and similar repositories for sphinx:
Users that are interested in sphinx are comparing it to the libraries listed below
- Automation for VirusTotal☆31Updated 8 years ago
- CRITs IOC Visualization in Maltego☆27Updated 10 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆45Updated 9 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Threat Intelligence distribution☆30Updated 9 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- ☆16Updated 10 years ago
- ☆36Updated 8 years ago
- A Python library for being a CND Batman....☆35Updated 9 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- API Tools☆27Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- ☆19Updated 8 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆97Updated 10 years ago
- onigiri - remote malware triage script☆24Updated 9 years ago
- Shared yara rules☆30Updated 11 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Detect Phishing with Bro IDS☆18Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Tom's Honey Pot as seen in Applied Network Security Monitoring.☆26Updated 9 years ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- Python interface to the CRITs API☆22Updated 8 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- A Windows Event Processing Utility☆46Updated 7 years ago
- Network sinkhole for isolated malware analysis☆40Updated 7 years ago