Robust Python SDK and Command Line Client for interacting with IntelOwl's API.
☆69Apr 1, 2025Updated 11 months ago
Alternatives and similar repositories for pyintelowl
Users that are interested in pyintelowl are comparing it to the libraries listed below
Sorting:
- IntelOwl's Web Interface. Built with Angular 10.☆86Sep 8, 2022Updated 3 years ago
- IntelOwl's client library/SDK in golang.☆22May 6, 2025Updated 10 months ago
- IntelOwl: manage your Threat Intelligence at scale☆4,505Updated this week
- Python library for threat intelligence☆93Jan 14, 2025Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆10Jul 3, 2021Updated 4 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- Detection Rules for Quark Engine. Please use the website below to explore our rules.☆31Mar 11, 2026Updated last week
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Threat Intel Platform for T-POTs☆188Mar 13, 2026Updated last week
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 10 months ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated last month
- Python module to use the MISP Taxonomies☆31Feb 19, 2026Updated last month
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Token Authentication module for Django Rest Framework with different token configuration for API client.☆48May 3, 2023Updated 2 years ago
- Collection of generic YARA rules☆16Updated this week
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 6 months ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- A Passive SSH back-end and scanner.☆104Jun 18, 2025Updated 9 months ago
- BuffaLogs is an Open Source Django App whose main purpose is to detect login anomalies☆64Updated this week
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Oct 11, 2021Updated 4 years ago
- A Commitment Scheme library for Coin Flipping/Tossing algorithms and sort.☆11Apr 12, 2023Updated 2 years ago
- Honeynet Project Static Site☆20Feb 16, 2026Updated last month
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated last week
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated 11 months ago
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆23May 4, 2024Updated last year
- Open Source Cyber Threat Intelligence Feed Collector☆17Sep 6, 2021Updated 4 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- Sigma rules to share with the community☆124Jan 29, 2025Updated last year
- GhidraQuark bridges Quark Engine into Ghidra☆39Mar 9, 2021Updated 5 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago