hrbrmstr / mhnLinks
Analyze and Visualize Data from Modern Honey Network Servers with R
☆15Updated 9 years ago
Alternatives and similar repositories for mhn
Users that are interested in mhn are comparing it to the libraries listed below
Sorting:
- Classifier to separate legitimate domains from those generated by a domain generating algorithm (DGA).☆41Updated 9 years ago
- Useful tools for working with the PassiveTotal API in R☆13Updated 9 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Updated 5 years ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Updated 3 years ago
- A collection of "network intelligence" utilities for R. ASN info, IP reputation, etc.☆39Updated 11 years ago
- Analyst tool for creating pivot maps of data sources☆17Updated 8 years ago
- Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds☆176Updated 10 years ago
- ⚔️MITRE ATT&CK Machinations in R☆23Updated 5 years ago
- Reading List for CSIRT Team Members☆17Updated 6 years ago
- ☆12Updated 8 years ago
- SANS Hunting on the Cheap☆36Updated 9 years ago
- Repository for the Apache Drill Workshop☆19Updated 9 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- Principles of MITRE ATT&CK in the fraud domain☆35Updated 6 years ago
- Scumblr instructions with custom search providers for monitoring malicous content☆17Updated 8 years ago
- ☆46Updated 2 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆57Updated 5 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 7 years ago
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Updated 7 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- ☆76Updated 7 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆52Updated 10 years ago
- Repository for my ATT&CK analysis research.☆69Updated 6 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Updated 7 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago