madirish / hector
HECTOR
☆19Updated 8 years ago
Alternatives and similar repositories for hector:
Users that are interested in hector are comparing it to the libraries listed below
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- **BETA** A simple buildscript for network security monitoring on RHEL/CentOS☆31Updated 8 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 2 years ago
- first commit☆20Updated last year
- Threat Intelligence distribution☆30Updated 9 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- Bro Intel Feed Linter☆26Updated 5 years ago
- CRITs IOC Visualization in Maltego☆27Updated 10 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- Script for generating Bro intel files from pdf or html reports☆76Updated 9 years ago
- scripts to help beginners program in Bro☆20Updated 11 years ago
- Automation for VirusTotal☆31Updated 8 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Broctl plugin for automatically executing 'setcap' on each node after an install☆13Updated 4 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- Netwitness Maltego integration Project☆18Updated 7 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 7 years ago
- Frontend for Codex Gigas☆21Updated 8 years ago
- Threatbutt python client and Maltego transforms☆51Updated 10 months ago
- AYY LMAO☆21Updated 9 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- ☆9Updated 7 years ago
- ☆25Updated 8 years ago
- Malware analysis using Docker project☆25Updated 9 years ago