Extract, defang, resolve names and IPs from text
☆23Jan 29, 2026Updated last month
Alternatives and similar repositories for ipgrep
Users that are interested in ipgrep are comparing it to the libraries listed below
Sorting:
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆16Nov 29, 2023Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- A dumb set of scripts for building a cuckoo rig☆61Feb 26, 2017Updated 9 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Sep 24, 2015Updated 10 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 13 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- A simple, but damn fast sinkhole☆65Dec 27, 2025Updated 2 months ago
- ☆29Nov 10, 2016Updated 9 years ago
- Scandiff is a PowerShell script to automate host discovery and scanning with nmap. After discovering and scanning hosts, scandiff perfor…☆18Oct 29, 2014Updated 11 years ago
- Tui Utility to test REST APIs☆13Nov 20, 2023Updated 2 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Slides and videos from talks given at cons☆25Jun 19, 2025Updated 9 months ago
- Universal Honey Pot☆29Aug 27, 2025Updated 6 months ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆66Mar 6, 2018Updated 8 years ago
- Small scripts and POCs related to digital forensics☆18Nov 1, 2022Updated 3 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 5 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- messing around writing reversing tools in clojure☆15Nov 9, 2017Updated 8 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- A project that implements statistical methods for identifying anomalous files☆22Dec 10, 2014Updated 11 years ago
- 针对iOS应用程序的漏洞检测☆11Dec 4, 2018Updated 7 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- please don't use it!☆13Nov 13, 2019Updated 6 years ago
- ☆12May 8, 2020Updated 5 years ago
- PowerShell Module to provide Network Block Device like functionality on Windows Hosts☆13Sep 27, 2015Updated 10 years ago
- IDAPython compatibility library. idasix aims to create a smooth ida development process and allow a single codebase to function with mult…☆25Aug 2, 2018Updated 7 years ago
- Raven is a Web application penetration testing tool.☆17Jun 16, 2021Updated 4 years ago
- A simple utility for stripping out either the SHA-1, MD5 or CRC values alone from the NSRL hash database☆14Nov 19, 2021Updated 4 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- Automated install scripts for Cuckoo sandbox☆38Dec 5, 2017Updated 8 years ago
- Convert Wigle.net result from json to Kml☆15Dec 4, 2020Updated 5 years ago
- SSD Wear Out // Multiprocessing C program and shell script which wears out SSD by writing to it continuously☆11Feb 16, 2019Updated 7 years ago