Python OpenIOC Editor
☆18Dec 28, 2015Updated 10 years ago
Alternatives and similar repositories for PyIOCe
Users that are interested in PyIOCe are comparing it to the libraries listed below
Sorting:
- Python IOC Editor☆65Mar 10, 2015Updated 11 years ago
- NSRL BloomFilter, Mandiant BloomFilter, Hyperloglog Malware Data Structure☆15Mar 14, 2014Updated 12 years ago
- Sublime Malware Research Tool☆66Oct 28, 2024Updated last year
- onigiri - remote malware triage script☆24Nov 5, 2015Updated 10 years ago
- ☆207May 3, 2023Updated 2 years ago
- Framework complet d'analyse de malware☆12Feb 22, 2016Updated 10 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- This is a framework written in EnScript to utilize the network capabilities of EnCase. The purpose is to allow for someone to build a qui…☆13Apr 22, 2015Updated 10 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- ☆12Sep 28, 2016Updated 9 years ago
- Dump and parse embedded certificates from Windows binaries☆11Jan 3, 2012Updated 14 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 11 years ago
- Crack your macros like the math pros.☆33Feb 14, 2017Updated 9 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Builds json representation of PDF malware sample☆53Apr 11, 2011Updated 14 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Checks with NSRL RDS servers looking for for hash matches☆115Feb 26, 2021Updated 5 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Feb 24, 2026Updated 3 weeks ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Sysmon Splunk App☆47Aug 21, 2018Updated 7 years ago
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Scanning and identifying XOR encrypted PE files in PE resources☆30Jun 22, 2014Updated 11 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Copy of Fresh Onions is an open source TOR spider / hidden service onion crawler☆30Jan 5, 2021Updated 5 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago