Website crawler with YARA detection
☆90Aug 20, 2023Updated 2 years ago
Alternatives and similar repositories for uzen
Users that are interested in uzen are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- A query aggregator for OSINT based threat hunting☆938Mar 7, 2026Updated last month
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- A phishing kit collector for scavengers☆222Jan 22, 2026Updated 3 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆24Sep 28, 2022Updated 3 years ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆117Nov 28, 2023Updated 2 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated last month
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 4 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- c2 traffic☆196Feb 6, 2023Updated 3 years ago
- Python script to hunt phishing kits☆138Jul 25, 2023Updated 2 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- An npm package to defang and refang IoC☆13Apr 11, 2026Updated 3 weeks ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- ☆15Nov 25, 2021Updated 4 years ago
- URL fingerprinting made easy☆89Apr 13, 2024Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- ☆20Oct 23, 2020Updated 5 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated 3 months ago
- Yara rules☆21Mar 27, 2023Updated 3 years ago
- Awesome VirusTotal Intelligence Search Queries☆333May 16, 2023Updated 2 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆225May 1, 2021Updated 5 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- A powershell parser for https://github.com/ufrisk/MemProcFS☆45May 12, 2021Updated 4 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Jun 3, 2021Updated 4 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Feb 4, 2021Updated 5 years ago