intelowlproject / pyintelowl
Robust Python SDK and Command Line Client for interacting with IntelOwl's API.
☆60Updated last week
Related projects ⓘ
Alternatives and complementary repositories for pyintelowl
- Website crawler with YARA detection☆88Updated last year
- Python library for threat intelligence☆80Updated 4 months ago
- Converting data from services like Censys and Shodan to a common data model☆48Updated 2 months ago
- Because phishtank was taken.. explore phishing kits in a contained environment!☆43Updated 2 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆96Updated 5 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆110Updated 11 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆56Updated 2 months ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆50Updated 2 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆65Updated 6 months ago
- A community event for security researchers to share their favorite notebooks☆106Updated 9 months ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆144Updated last year
- ☆34Updated 3 years ago
- ☆46Updated 2 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆84Updated last week
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆56Updated last year
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- ☆27Updated 3 years ago
- Cloud Templates and scripts to deploy mordor environments☆127Updated 3 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆58Updated last year
- The Intelligent Process Lifecycle of Active Cyber Defenders☆31Updated last year
- An open source platform to support analysts to organise their case and tasks☆55Updated this week
- Recon Hunt Queries☆75Updated 3 years ago
- Various capabilities for static malware analysis.☆75Updated 2 months ago
- ☆49Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆73Updated 2 weeks ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆24Updated 3 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago