Automated IOC-Generation scripts and tools
☆24Sep 14, 2016Updated 9 years ago
Alternatives and similar repositories for iocgen
Users that are interested in iocgen are comparing it to the libraries listed below
Sorting:
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Python script to pull various IOCs from PDFs☆15Dec 22, 2014Updated 11 years ago
- A warehouse for your malware☆20Feb 25, 2013Updated 13 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- pan-stix☆19Oct 12, 2017Updated 8 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Parses MSDN documentation into an XML file☆31Jan 10, 2012Updated 14 years ago
- ☆207May 3, 2023Updated 2 years ago
- Modified edition of cuckoo community modules☆50May 12, 2017Updated 8 years ago
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- ☆25Jul 8, 2015Updated 10 years ago
- CuckooMX is a project to automate analysis of files transmitted over SMTP (using the Cuckoo sandbox)☆40Aug 2, 2012Updated 13 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆35Apr 16, 2021Updated 4 years ago
- Certificate Expiration Monitor script☆27Oct 10, 2018Updated 7 years ago
- Collecting & Hunting for IOCs with gusto and style☆117Aug 9, 2018Updated 7 years ago
- ☆10Apr 20, 2022Updated 3 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- Parse a report and import the events into MISP☆30Oct 19, 2015Updated 10 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- ☆36Feb 2, 2015Updated 11 years ago
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆42Nov 29, 2025Updated 3 months ago
- A set of Python classes that interact with and extend the Keybase.io data store of public keys☆30Sep 11, 2019Updated 6 years ago
- ☆28Feb 13, 2017Updated 9 years ago
- Replaces all .jpg and .png with a picture of nicolas cage.☆10Jun 10, 2014Updated 11 years ago
- Imports MSDN documentation into IDA Pro☆52Jan 10, 2012Updated 14 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆35Mar 5, 2016Updated 9 years ago
- Modified edition of cuckoo community modules☆32Sep 9, 2019Updated 6 years ago
- 🍔⌨ Zom Zom Zomato CLI tool☆10Nov 7, 2017Updated 8 years ago
- Vector Tree Ring Generator for Pen Plotting☆12Oct 16, 2023Updated 2 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Python implementation of Measurement Computing's DAQFlex command framework☆15Dec 12, 2014Updated 11 years ago
- ☆10Jul 23, 2022Updated 3 years ago
- Download the latest Palo Alto Networks content update☆13Aug 23, 2018Updated 7 years ago
- Website for The State of FOSS in India report.☆10Aug 20, 2021Updated 4 years ago