jasonsford / intel_collector
Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.
☆31Updated last year
Alternatives and similar repositories for intel_collector
Users that are interested in intel_collector are comparing it to the libraries listed below
Sorting:
- Can you pay the ransom in your country?☆14Updated last year
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆22Updated 3 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆43Updated 3 years ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago
- Threat Box Assessment Tool☆19Updated 3 years ago
- ☆20Updated 2 months ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Yara rules☆21Updated 2 years ago
- ☆42Updated last year
- my MSTICpy practice and custom tools repository☆11Updated 3 weeks ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆19Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆27Updated 3 weeks ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Scripts and lists to help generate YARA friendly string mutations☆21Updated 2 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆32Updated 3 weeks ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- simple webapp for converting sigma rules into siem queries using the pySigma library☆48Updated last year
- Cyber Threats Detection Rules☆14Updated 4 months ago
- Quick ESXi Log Parser☆19Updated 4 months ago
- ☆14Updated 2 years ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Collection of scripts used to analyse malware or emails☆19Updated 4 years ago
- ☆21Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Updated 3 months ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago