IntelOwl's Web Interface. Built with Angular 10.
☆86Sep 8, 2022Updated 3 years ago
Alternatives and similar repositories for IntelOwl-ng
Users that are interested in IntelOwl-ng are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Robust Python SDK and Command Line Client for interacting with IntelOwl's API.☆69Apr 1, 2025Updated last year
- IntelOwl: manage your Threat Intelligence at scale☆4,560Apr 29, 2026Updated last week
- IntelOwl's client library/SDK in golang.☆22May 6, 2025Updated last year
- Run PowerShell command without invoking powershell.exe☆12Sep 2, 2017Updated 8 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆128Jun 19, 2020Updated 5 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- A server providing RESTful access to CyberChef☆171Mar 28, 2026Updated last month
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆22Nov 19, 2025Updated 5 months ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Electron based screenshot scanner☆67Feb 4, 2023Updated 3 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- File based database☆15Sep 16, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Python library for parsing, manipulating, and generating MAEC content.☆42Nov 16, 2020Updated 5 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 15 years ago
- ☆12Oct 12, 2013Updated 12 years ago
- Home to the ActorTrackr source code☆30Aug 31, 2017Updated 8 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Scripts, SQL queries, and other resources for Nexpose☆30Mar 3, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- USN to JSON☆22Apr 4, 2020Updated 6 years ago
- ☆32Aug 1, 2024Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 13, 2026Updated 3 weeks ago
- The samples referenced in my book, Evasive Malware (No starch Press)☆60Feb 20, 2026Updated 2 months ago
- For FUN! Use at your own risk. No warranties, no exceptions.☆19Dec 8, 2022Updated 3 years ago
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Feb 22, 2017Updated 9 years ago
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 5 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 9 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- ☆24Apr 22, 2026Updated 2 weeks ago
- automated password spraying tool☆148Jun 15, 2021Updated 4 years ago
- Sources Codes of many Office Malwares☆18Sep 4, 2022Updated 3 years ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Aug 31, 2018Updated 7 years ago
- Source code of https://torstatus.rueckgr.at☆10Jan 14, 2026Updated 3 months ago