Import AbuseCH IOC Feeds into MISP
☆12Feb 17, 2021Updated 5 years ago
Alternatives and similar repositories for AbuseCH-to-MISP
Users that are interested in AbuseCH-to-MISP are comparing it to the libraries listed below
Sorting:
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- FakeOpenSmtpRelay.py is a Python3 script simulating a working open SMTP relay☆13Mar 18, 2019Updated 7 years ago
- A (tampering) proxy server for Apple's Siri☆20Nov 29, 2011Updated 14 years ago
- ☆21Jan 28, 2026Updated last month
- CyanogenMod device config☆30Feb 15, 2011Updated 15 years ago
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- ☆36Nov 30, 2023Updated 2 years ago
- Defensomania is a security monitoring and incident response card game.☆65May 24, 2023Updated 2 years ago
- A python script that basically adds a check engine light to your computer☆12Sep 14, 2024Updated last year
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- Real Cookbooks for Nerds☆28Aug 24, 2012Updated 13 years ago
- Python scripts for Malware Bazaar☆157Jun 3, 2024Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆185Oct 3, 2025Updated 5 months ago
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- CSIRT Jump Bag☆27Apr 25, 2024Updated last year
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- Public documents about bachelor thesis "Reverse Engineering Analysis of the NDIS 6.* stack"☆41Jun 26, 2016Updated 9 years ago
- repository containing some nmap scripts☆16Jan 15, 2021Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- AADInternals Authenticator Android App☆11Jul 2, 2020Updated 5 years ago
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- Matos is an open-source cloud security tool for analyzing multi-cloud infrastructure security.☆17Feb 16, 2023Updated 3 years ago
- ☆14Nov 12, 2021Updated 4 years ago
- Open Service Mesh (OSM) on Azure☆13Updated this week
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Feb 4, 2021Updated 5 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- Reads and prints information from the website MalAPI.io☆39Jan 18, 2022Updated 4 years ago
- A Bloom filter & Golang server for checking passwords against the "Have I Been Pwned 2.0" password database.☆53Apr 15, 2022Updated 3 years ago
- Tools that trigger False Positive AV alerts☆56Dec 24, 2024Updated last year
- suspect is a simple bash triage tool☆19Aug 30, 2018Updated 7 years ago
- Convert SRT file to Audacity supported Label.☆11Sep 4, 2020Updated 5 years ago