Website crawler with YARA detection
☆89Aug 20, 2023Updated 2 years ago
Alternatives and similar repositories for uzen
Users that are interested in uzen are comparing it to the libraries listed below
Sorting:
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A phishing kit collector for scavengers☆220Jan 22, 2026Updated last month
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated last month
- ☆24Sep 28, 2022Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆118Nov 28, 2023Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Feb 26, 2026Updated last week
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- c2 traffic☆194Feb 6, 2023Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- An npm package to defang and refang IoC☆12Sep 7, 2025Updated 6 months ago
- URL fingerprinting made easy☆89Apr 13, 2024Updated last year
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- ☆23Mar 17, 2024Updated last year
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- Awesome VirusTotal Intelligence Search Queries☆332May 16, 2023Updated 2 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- RPM packages for MISP☆40Updated this week
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Feb 14, 2025Updated last year
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- AIL framework - Analysis Information Leak framework☆885Updated this week
- Searches for Insider Threat Hunting☆29May 2, 2019Updated 6 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 5 months ago
- Sysmon EDR POC Build within Powershell to prove ability.☆223May 1, 2021Updated 4 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆462Updated this week
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆39Apr 27, 2025Updated 10 months ago
- JPCERT/CC public YARA rules repository☆109Nov 14, 2025Updated 3 months ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆657Mar 11, 2024Updated last year