Home to the ActorTrackr source code
☆30Aug 31, 2017Updated 8 years ago
Alternatives and similar repositories for actortrackr
Users that are interested in actortrackr are comparing it to the libraries listed below
Sorting:
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Code and templates required to build the DARPA open catalog.☆17Mar 23, 2016Updated 9 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- IRMA frontend☆25Nov 28, 2016Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- Use security tools from within IRC.☆24Mar 20, 2012Updated 13 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Converting data from services like Censys and Shodan to a common data model☆52Feb 22, 2026Updated last week
- Multithreaded threat Intelligence gathering built with Python3☆178Jan 23, 2018Updated 8 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Nov 19, 2020Updated 5 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Pass-thru web server for traffic redirection☆28May 6, 2019Updated 6 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- ☆27Jul 25, 2025Updated 7 months ago
- Path bookmarking for bash. I use this extensively throughout my day.☆23Apr 22, 2020Updated 5 years ago
- ☆54Sep 6, 2020Updated 5 years ago
- (OBSOLETE) Plugins for Bro☆53Sep 13, 2017Updated 8 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Apr 24, 2018Updated 7 years ago
- python wrapper to use tshark for file extraction from the command line.☆26Nov 15, 2018Updated 7 years ago
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Jan 22, 2023Updated 3 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Nov 11, 2023Updated 2 years ago
- Prototype of making fisma 800-53 controls interactive☆27Nov 8, 2020Updated 5 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- ☆64Feb 12, 2022Updated 4 years ago
- A document metadata spider.☆74Aug 30, 2016Updated 9 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- ☆39Apr 23, 2024Updated last year
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆13May 9, 2020Updated 5 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago