hrbrmstr / mhnLinks
Analyze and Visualize Data from Modern Honey Network Servers with R
☆15Updated 10 years ago
Alternatives and similar repositories for mhn
Users that are interested in mhn are comparing it to the libraries listed below
Sorting:
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 9 years ago
- Useful tools for working with the PassiveTotal API in R☆13Updated 9 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Updated 5 years ago
- A collection of "network intelligence" utilities for R. ASN info, IP reputation, etc.☆39Updated 11 years ago
- Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds☆177Updated 10 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Updated 5 years ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Updated 3 years ago
- Scumblr instructions with custom search providers for monitoring malicous content☆17Updated 8 years ago
- Analyst tool for creating pivot maps of data sources☆16Updated 8 years ago
- SANS Hunting on the Cheap☆36Updated 9 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated 2 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 9 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15Updated 2 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- ☆12Updated 8 years ago
- Reading List for CSIRT Team Members☆17Updated 6 years ago
- R package to work with the Shodan API☆18Updated 7 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated 2 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Updated 6 years ago
- ☆21Updated 9 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Updated 7 years ago
- ☆54Updated 5 years ago
- OpenDNS Graph Miner☆45Updated 8 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Updated 5 years ago
- ☆29Updated 9 years ago
- ☆76Updated 7 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- Bluecoat SiteReview Checker (CLI)☆45Updated 6 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Updated 9 years ago