keeganhines / snowman
☆12Updated 7 years ago
Alternatives and similar repositories for snowman:
Users that are interested in snowman are comparing it to the libraries listed below
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- SANS Hunting on the Cheap☆35Updated 8 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Updated 10 years ago
- integrating bro into yara☆33Updated 10 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19Updated 9 years ago
- ☆28Updated 8 years ago
- Identifies phishing websites using a treebag model☆22Updated 4 years ago
- Tools for Automated Analysis of Cybercriminal Markets☆51Updated 6 years ago
- Proof-of-concept automated baremetal malware analysis framework.☆14Updated 9 years ago
- ☆24Updated 8 years ago
- Manage VT Alerts☆62Updated 8 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- ☆45Updated 7 years ago
- Passive DNS V2☆62Updated 10 years ago
- ripPE - section extractor and profiler for PE file analysis☆32Updated 10 years ago
- OpenDNS Graph Miner☆45Updated 7 years ago
- Honeypot log processor to create OTX Pulse entries☆29Updated last year
- Threat Intelligence distribution☆30Updated 9 years ago
- Volatility Plugins☆21Updated 9 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- Command-line Interface for Binar.ly☆37Updated 8 years ago
- ☆21Updated 9 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆15Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 5 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- ☆22Updated 7 years ago
- A Framework for managing Cyber Threat Intelligence.☆5Updated 6 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20Updated 8 years ago