Python tools for IOC (Indicator of Compromise) handling
☆96Nov 25, 2021Updated 4 years ago
Alternatives and similar repositories for pyioc
Users that are interested in pyioc are comparing it to the libraries listed below
Sorting:
- Find useful stuff in pastebin☆23Apr 10, 2013Updated 12 years ago
- Network Block Device Server for windows with a DFIR/forensic focus.☆96Mar 31, 2017Updated 8 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 9 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Lutech TMS EHAT-NG☆13Jul 8, 2017Updated 8 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- STIX Tools & Scripts☆47Dec 2, 2013Updated 12 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- Tiny Honeypot☆19Aug 9, 2013Updated 12 years ago
- Python IOC Editor☆65Mar 10, 2015Updated 10 years ago
- python SDK for CIFv2☆13Nov 5, 2019Updated 6 years ago
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 11 years ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆473Jan 19, 2019Updated 7 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Oct 18, 2016Updated 9 years ago
- Python Malware Crawler for Zoos and Repositories☆109Apr 9, 2018Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Dec 10, 2014Updated 11 years ago
- CRITs - Collaborative Research Into Threats☆910Jul 29, 2019Updated 6 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- PyCommands for Immunity Debugger☆29Mar 30, 2013Updated 12 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago