ninoseki / uzenView external linksLinks
Website crawler with YARA detection
☆90Aug 20, 2023Updated 2 years ago
Alternatives and similar repositories for uzen
Users that are interested in uzen are comparing it to the libraries listed below
Sorting:
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A phishing kit collector for scavengers☆220Jan 22, 2026Updated 3 weeks ago
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated 3 weeks ago
- ☆24Sep 28, 2022Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆117Nov 28, 2023Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Sep 2, 2025Updated 5 months ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- c2 traffic☆194Feb 6, 2023Updated 3 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- An npm package to defang and refang IoC☆12Sep 7, 2025Updated 5 months ago
- URL fingerprinting made easy☆90Apr 13, 2024Updated last year
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- ☆23Mar 17, 2024Updated last year
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Awesome VirusTotal Intelligence Search Queries☆331May 16, 2023Updated 2 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- RPM packages for MISP☆39Jan 15, 2026Updated 3 weeks ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Feb 14, 2025Updated 11 months ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last week
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Nov 9, 2022Updated 3 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- AIL framework - Analysis Information Leak framework☆878Feb 4, 2026Updated last week
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 6 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 4 months ago
- Sysmon EDR POC Build within Powershell to prove ability.☆226May 1, 2021Updated 4 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆462Dec 1, 2025Updated 2 months ago
- Some portable tools, some YARA, some Python, and a little bit of love. Not all of these tools can be used in incident response. Use PEs…☆38Apr 27, 2025Updated 9 months ago
- JPCERT/CC public YARA rules repository☆110Nov 14, 2025Updated 3 months ago
- StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.☆659Mar 11, 2024Updated last year
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Jun 23, 2025Updated 7 months ago
- Yara Based Detection Engine for web browsers☆49Sep 5, 2021Updated 4 years ago