Cyber Intel Management
☆51Jan 25, 2018Updated 8 years ago
Alternatives and similar repositories for malstrom
Users that are interested in malstrom are comparing it to the libraries listed below
Sorting:
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- Multithreaded threat Intelligence gathering built with Python3☆178Jan 23, 2018Updated 8 years ago
- ☆15Nov 11, 2015Updated 10 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- Carbonblack Live Response from the comfort of your own terminal☆20Jan 20, 2016Updated 10 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆184Apr 20, 2023Updated 2 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- An Open Source Malware Analysis Pipeline System☆157Jun 1, 2021Updated 4 years ago
- Megatron - A System for Abuse- and Incident Handling☆45Mar 29, 2017Updated 8 years ago
- Snort Rules☆19Mar 9, 2016Updated 9 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- Collection of scripts for different malware analysis tasks☆76Jul 15, 2019Updated 6 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆151Jun 3, 2014Updated 11 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆279Mar 1, 2023Updated 2 years ago
- Shared yara rules☆30Mar 17, 2014Updated 11 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 8 months ago
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆129Aug 28, 2015Updated 10 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- ☆64Feb 12, 2022Updated 4 years ago
- Splunk app to support presentation at .conf2015 on free security tools and Splunk☆10Sep 24, 2015Updated 10 years ago
- Repository for proxenet plugins☆14Jun 14, 2016Updated 9 years ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Mar 29, 2019Updated 6 years ago