madirish / hector
HECTOR
☆19Updated 8 years ago
Alternatives and similar repositories for hector
Users that are interested in hector are comparing it to the libraries listed below
Sorting:
- ☆25Updated 8 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 7 months ago
- Threat Intelligence distribution☆30Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Network sinkhole for isolated malware analysis☆40Updated 7 years ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- Next major release of sniffMyPackets - Now with added packet loving☆12Updated 10 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Updated 8 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- cuckoo sandbox patches and scripts☆15Updated 11 years ago
- Universal Honey Pot☆29Updated 2 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 7 years ago
- ☆30Updated 6 years ago
- ☆22Updated 7 years ago
- ☆19Updated 8 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- Frontend for Codex Gigas☆21Updated 8 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Updated 10 years ago
- Passive DNS V2☆60Updated 11 years ago
- Automation for VirusTotal☆31Updated 9 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- integrating bro into yara☆33Updated 10 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 3 years ago
- Malware analysis using Docker project☆25Updated 9 years ago