ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a set of Google Custom Search Engines.
☆70Mar 9, 2015Updated 11 years ago
Alternatives and similar repositories for ThreatTracker
Users that are interested in ThreatTracker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- Parse Yara rules and operate over them more easily.☆51Jan 7, 2019Updated 7 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Cyber Intel Management☆50Jan 25, 2018Updated 8 years ago
- Standalone CIRCLean/KittenGroomer code to sanitize emails.☆11Aug 9, 2018Updated 7 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Website letting users query information from many different security threat intelligence APIs☆26Sep 30, 2020Updated 5 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Malware analyses and helpful scripts☆30May 26, 2022Updated 3 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆17Sep 3, 2015Updated 10 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Yara rules for malware families seen as part of targeted threats project☆143Nov 17, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- a Malware/Threat Analyst Desktop☆89Aug 25, 2015Updated 10 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.