API wrapper for Maltiverse
☆19Feb 25, 2026Updated this week
Alternatives and similar repositories for python-maltiverse
Users that are interested in python-maltiverse are comparing it to the libraries listed below
Sorting:
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- Ghidra consonance and make it more ida-ish☆16Mar 11, 2019Updated 6 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- Tools for auditing WAFS☆19Feb 25, 2022Updated 4 years ago
- ☆21Dec 22, 2020Updated 5 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆26Oct 20, 2022Updated 3 years ago
- 🌴 The STIX2 Pattern expression parser for humans☆26Jun 29, 2019Updated 6 years ago
- An architecture plugin for binary ninja to disassemble raw python bytecode☆29Nov 12, 2017Updated 8 years ago
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- Messing around with clamav sigs☆26Aug 3, 2020Updated 5 years ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- Yet Another YARA rule Generator☆65Oct 9, 2018Updated 7 years ago
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Apr 6, 2020Updated 5 years ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆34May 27, 2024Updated last year
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- Predict whether internet traffic is malicious given historical router traffic data☆35Aug 13, 2020Updated 5 years ago
- CrowdStrike Threat Intelligence☆35Jan 14, 2023Updated 3 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98May 20, 2016Updated 9 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- GPG key integration for Blockstack client applications☆10Aug 1, 2017Updated 8 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Python client for IP to ASN lookup services☆12Feb 21, 2026Updated last week
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Lists of Dynamic DNS Domains/FQDNs as well as lists of services/providers that offer free dynamic dns domains.☆13Nov 2, 2021Updated 4 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Jul 10, 2025Updated 7 months ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Yara sort☆13Updated this week