jonschipp / mal-dnssearchView external linksLinks
Compare multiple log formats against malware reputation lists.
☆88Jul 27, 2017Updated 8 years ago
Alternatives and similar repositories for mal-dnssearch
Users that are interested in mal-dnssearch are comparing it to the libraries listed below
Sorting:
- A collection of Bro scripts I've written☆41Jun 5, 2015Updated 10 years ago
- Meeting notes☆14Apr 5, 2016Updated 9 years ago
- Script for generating Bro intel files from pdf or html reports☆77Dec 7, 2015Updated 10 years ago
- Detect Phishing with Bro IDS☆18Feb 1, 2017Updated 9 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- Isolated, Scalable, & Lightweight Environment for Training☆111Jun 24, 2019Updated 6 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Honeypot log processor to create OTX Pulse entries☆28Jan 1, 2024Updated 2 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Sep 20, 2021Updated 4 years ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago
- Analysis scripts for the Bro Intrusion Detection System☆59Feb 26, 2014Updated 11 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Broctl plugin for automatically executing 'setcap' on each node after an install☆13Dec 18, 2020Updated 5 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- ☆49Mar 14, 2015Updated 10 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- Flow-Indexer indexes flows found in chunked log files from bro,nfdump,syslog, or pcap files☆44May 9, 2024Updated last year
- It's like a polaroid, but for domains☆24Feb 6, 2015Updated 11 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 10 years ago
- Automater - IP URL and MD5 OSINT Analysis☆554Aug 13, 2024Updated last year
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 8 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- threat language parser☆60Apr 20, 2015Updated 10 years ago
- Threat Intelligence APIs☆282Aug 14, 2023Updated 2 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 7 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆278Mar 1, 2023Updated 2 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆69Mar 9, 2015Updated 10 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- Bro scripts written by CrowdStrike Services☆148May 3, 2021Updated 4 years ago
- A tool to retrieve malware directly from the source for security researchers.☆564Jul 27, 2017Updated 8 years ago