Robust Python SDK and Command Line Client for interacting with IntelOwl's API.
☆69Apr 1, 2025Updated last year
Alternatives and similar repositories for pyintelowl
Users that are interested in pyintelowl are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IntelOwl's Web Interface. Built with Angular 10.☆86Sep 8, 2022Updated 3 years ago
- IntelOwl's client library/SDK in golang.☆22May 6, 2025Updated 11 months ago
- IntelOwl: manage your Threat Intelligence at scale☆4,534Updated this week
- Python library for threat intelligence☆94Jan 14, 2025Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆10Jul 3, 2021Updated 4 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Nov 29, 2020Updated 5 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Is this IP a C2 server?☆28Apr 21, 2020Updated 5 years ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- Threat Intel Platform for T-POTs☆194Apr 3, 2026Updated last week
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆35Oct 29, 2021Updated 4 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 11 months ago
- Add your configs for tmux☆18Apr 3, 2022Updated 4 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 2 months ago
- Python module to use the MISP Taxonomies☆31Apr 2, 2026Updated last week
- Tool to extract indicators of compromise from security reports in PDF,HTML,Web,Text format☆10Nov 6, 2017Updated 8 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Token Authentication module for Django Rest Framework with different token configuration for API client.☆48May 3, 2023Updated 2 years ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated 3 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆50Aug 30, 2025Updated 7 months ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- A Passive SSH back-end and scanner.☆104Jun 18, 2025Updated 9 months ago
- BuffaLogs is an Open Source Django App whose main purpose is to detect login anomalies☆64Mar 30, 2026Updated last week
- Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner☆44Oct 11, 2021Updated 4 years ago
- ☆16Mar 24, 2026Updated 2 weeks ago
- A Commitment Scheme library for Coin Flipping/Tossing algorithms and sort.☆11Apr 12, 2023Updated 2 years ago
- Honeynet Project Static Site☆20Feb 16, 2026Updated last month
- a modified version base on Tracecorn☆20Oct 29, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- THOR APT Scanner User Manual☆20Mar 31, 2026Updated last week
- Simple yara rule manager☆67Dec 27, 2022Updated 3 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆23May 4, 2024Updated last year
- Open Source Cyber Threat Intelligence Feed Collector☆16Sep 6, 2021Updated 4 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated 2 years ago
- Sigma rules to share with the community☆124Jan 29, 2025Updated last year
- GhidraQuark bridges Quark Engine into Ghidra☆39Mar 9, 2021Updated 5 years ago