Pythonic interface to the Internet Storm Center / DShield API.
☆29May 23, 2023Updated 2 years ago
Alternatives and similar repositories for python-dshield
Users that are interested in python-dshield are comparing it to the libraries listed below
Sorting:
- Organize, tag, and search your GitHub stars. [Work in Progress]☆41Nov 21, 2020Updated 5 years ago
- Python based client for IBM XForce Exchange☆26Aug 5, 2016Updated 9 years ago
- A Python library to interface with a cuckoo-modified instance☆23Oct 31, 2016Updated 9 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Jun 14, 2020Updated 5 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- All xxx-arsenal repos in one☆17Jan 28, 2019Updated 7 years ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Oct 12, 2020Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- A Python DNS crawler to find identical domain names under different TLDs.☆25May 18, 2019Updated 6 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- Docker configs and build scripts.☆22Dec 21, 2014Updated 11 years ago
- A tool designed for consistent and safe capture of off network web resources.☆39Mar 24, 2017Updated 8 years ago
- Minimal, consistent Python API for building integrations with malware sandboxes.☆142Jan 31, 2024Updated 2 years ago
- Links to VeteranSec Resources☆12May 18, 2020Updated 5 years ago
- A modular Python application to collect intelligence for malicious hosts.☆274Apr 13, 2021Updated 4 years ago
- Man-in-the-middle against Tor bridges☆28Feb 9, 2020Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Yara syntax highlighting☆25Sep 4, 2021Updated 4 years ago
- Proof of concept denial of service over TOR stress test tool☆42Feb 23, 2026Updated 3 weeks ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- API to use Cymru services☆27Dec 6, 2013Updated 12 years ago
- (Unofficial) Python API for https://malwr.com/☆62Oct 13, 2016Updated 9 years ago
- Python IOC Editor☆65Mar 10, 2015Updated 11 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Hunting IOCs all day every day...☆88Sep 26, 2023Updated 2 years ago
- Mobile phone PWN tools and scripts☆16Sep 20, 2020Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- System wide keylogger for Mac and Windows #openFrameworks☆13Sep 5, 2011Updated 14 years ago
- Apple wireless research and tools☆19Jul 19, 2020Updated 5 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Nov 5, 2019Updated 6 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- Machinae Security Intelligence Collector☆539May 15, 2024Updated last year
- Checks with NSRL RDS servers looking for for hash matches☆115Feb 26, 2021Updated 5 years ago