Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract texts from images. Built for threat intel use-cases.
☆12Apr 21, 2026Updated last week
Alternatives and similar repositories for file2txt
Users that are interested in file2txt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆80Apr 17, 2026Updated 2 weeks ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆37Oct 21, 2025Updated 6 months ago
- A Python script and executable for simulating the GPS location of an iOS 17 device connected to your computer using pymobiledevice3. Prov…☆12Jan 10, 2024Updated 2 years ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 7 months ago
- Translate srt subtitles through Google Translation API☆16Apr 20, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- Script for deploying CTF tools (Linux) tested on Kali 2☆12Feb 15, 2021Updated 5 years ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated last month
- NHS Hack Day website☆13Apr 25, 2026Updated last week
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Tool to extract indicators of compromise from security reports in PDF format☆35Mar 5, 2016Updated 10 years ago
- ☆14Jul 18, 2022Updated 3 years ago
- A Google App Engine application to archive the posts from Hacker News☆16Jun 3, 2018Updated 7 years ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆38Apr 22, 2026Updated last week
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆25Updated this week
- Feed of phish-domains found by Validin Threat Intelligince Platform☆36Updated this week
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 7 months ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- ☆19Dec 3, 2012Updated 13 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆205Jul 3, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Low-tech medication reminder application that can call or text a user with a custom message on any desired schedule.☆13Feb 7, 2016Updated 10 years ago
- File storage system using Kademlia p2p network☆11May 9, 2018Updated 7 years ago
- A streamlined way to create STIX documents!☆31Apr 30, 2014Updated 12 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Jan 29, 2024Updated 2 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- KQL queries for Incident Response☆14Oct 31, 2023Updated 2 years ago
- AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.☆17Apr 19, 2023Updated 3 years ago
- UKPlanning provides scraper classes to access data from planning authorities in the UK. Note this version is the only openly available pu…☆17Feb 9, 2019Updated 7 years ago
- janus webrtc gateway docker playground☆12Apr 18, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Docker container bundling tools for manual AWS security reviews☆12Sep 12, 2018Updated 7 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Simple command line integration to Chat GPT☆11Jan 23, 2023Updated 3 years ago
- Open Doodles☆13Jan 4, 2023Updated 3 years ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆12Aug 14, 2025Updated 8 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago