intelowlproject / pyintelowlLinks
Robust Python SDK and Command Line Client for interacting with IntelOwl's API.
☆68Updated 7 months ago
Alternatives and similar repositories for pyintelowl
Users that are interested in pyintelowl are comparing it to the libraries listed below
Sorting:
- Wrap any binary into a cached webserver☆56Updated 3 years ago
 - Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆65Updated 2 years ago
 - Website crawler with YARA detection☆90Updated 2 years ago
 - Threat Intel Platform for T-POTs☆158Updated last week
 - This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
 - This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Updated last year
 - Threat-Intelligence Feeds & Tools & Frameworks☆220Updated last year
 - Converting data from services like Censys and Shodan to a common data model☆50Updated 4 months ago
 - HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physic…☆84Updated last year
 - ☆53Updated 3 years ago
 - A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 6 months ago
 - Python library for threat intelligence☆89Updated 9 months ago
 - SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated 2 years ago
 - Submits multiple domains to VirusTotal API☆59Updated 4 years ago
 - Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 3 months ago
 - Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
 - Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆171Updated last year
 - Automated handling of data feeds for security teams☆143Updated last month
 - A collection of tips for using MISP.☆74Updated 10 months ago
 - S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆89Updated 2 years ago
 - 🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.☆264Updated 2 years ago
 - An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 3 weeks ago
 - Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆48Updated 3 years ago
 - Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago
 - Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
 - Hatching Triage public command-line utility and API library.☆73Updated 2 years ago
 - Tool used to perform threat intelligence against packet data☆36Updated 9 months ago
 - Valhalla API Client☆70Updated 2 years ago
 - Because phishtank was taken.. explore phishing kits in a contained environment!☆48Updated 3 years ago
 - Recon Hunt Queries☆79Updated 4 years ago