mlsecproject / gglsbl-rest
Dockerized REST service to look up URLs in Google Safe Browsing v4 API
☆77Updated 3 years ago
Alternatives and similar repositories for gglsbl-rest:
Users that are interested in gglsbl-rest are comparing it to the libraries listed below
- Universal Honey Pot☆29Updated 2 years ago
- A dumb set of scripts for building a cuckoo rig☆61Updated 8 years ago
- Honeypot log processor to create OTX Pulse entries☆28Updated last year
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- DNSDB query scripts☆75Updated 5 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- ☆64Updated 3 years ago
- Cyber Intel Management☆48Updated 7 years ago
- threat language parser☆60Updated 10 years ago
- Malware/IOC ingestion and processing engine☆105Updated 6 years ago
- Docker container for MISP☆96Updated 6 years ago
- Messing around with clamav sigs☆26Updated 4 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- It's like a polaroid, but for domains☆24Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆34Updated 9 years ago
- ☆28Updated 8 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 6 years ago
- (Unofficial) Python API for https://malwr.com/☆62Updated 8 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆81Updated 9 years ago
- My Yara Rules Collection☆52Updated 9 years ago
- Aggregates security threats from a number of online sources, and outputs to Syslog CEF, Snort Signatures, Iptables rules, hosts.deny, etc…☆80Updated 9 years ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 9 years ago
- Imports Alienvault OTX pulses to a MISP instance☆52Updated 3 years ago
- Harbinger Threat Intelligence☆83Updated 9 years ago
- A framework for receiving and redistributing abuse feeds☆123Updated 5 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Updated 9 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Updated 3 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated last year