kdrypr / CTI-Feed-CollectorView external linksLinks
Open Source Cyber Threat Intelligence Feed Collector
☆17Sep 6, 2021Updated 4 years ago
Alternatives and similar repositories for CTI-Feed-Collector
Users that are interested in CTI-Feed-Collector are comparing it to the libraries listed below
Sorting:
- A Python/Scapy based ARP Cache Poisoning tool.☆12Apr 3, 2016Updated 9 years ago
- Yet another implementation of PEiD with yara☆17Jan 6, 2017Updated 9 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆33Jul 12, 2022Updated 3 years ago
- CSIRT Jump Bag☆27Apr 25, 2024Updated last year
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- Assess Windows OS for security misconfigurations and hardening opportunities.☆36Jul 20, 2024Updated last year
- ☆10Dec 5, 2017Updated 8 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- A R Package for Property Tax analysis☆11Dec 22, 2025Updated last month
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- ☆11Oct 17, 2024Updated last year
- Fractals using Python 3☆10Apr 9, 2021Updated 4 years ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated 2 weeks ago
- ☆44Jul 11, 2025Updated 7 months ago
- BlackBerry Threat Research & Intelligence☆100Oct 20, 2023Updated 2 years ago
- Scripts and ideas shared with the community.☆14Dec 8, 2025Updated 2 months ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- ALL IN ONE Hacking Tool For Hackers☆10Dec 12, 2020Updated 5 years ago
- The hub for all JATS4R meeting notes, examples, draft recommendations, documents, and issues.☆17Sep 8, 2019Updated 6 years ago
- NTOP nDPI Library example usage and FFI bindings for Lua, NodeJS☆13Jan 29, 2018Updated 8 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- ☆14Jan 29, 2026Updated 2 weeks ago
- Binary and Static Releases☆16Nov 18, 2025Updated 2 months ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- Total Anomaly Detection System for software logs and traces☆10Dec 7, 2015Updated 10 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- Repository for integration with Apache Kafka☆14Jul 22, 2022Updated 3 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago