☆64Feb 12, 2022Updated 4 years ago
Alternatives and similar repositories for threatshell
Users that are interested in threatshell are comparing it to the libraries listed below
Sorting:
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Collection of scripts for different malware analysis tasks☆76Jul 15, 2019Updated 6 years ago
- IRMA frontend☆25Nov 28, 2016Updated 9 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Sep 20, 2021Updated 4 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- threat language parser☆59Apr 20, 2015Updated 10 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- OS X Strata builds upon Yelps OSXCollector, providing a user interface to analyze data collected from a potentially compromised system.☆14Jul 3, 2019Updated 6 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 9 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- ☆75Jan 24, 2017Updated 9 years ago
- Cyber Intel Management☆51Jan 25, 2018Updated 8 years ago
- A websocket proxy☆55Nov 13, 2017Updated 8 years ago
- Shared yara rules☆30Mar 17, 2014Updated 11 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- A Network Inspection Tool☆82Oct 13, 2017Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Automated threat intelligence collection with McAfee ATD, OpenDXL and MISP☆22Feb 21, 2020Updated 6 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆17Feb 10, 2016Updated 10 years ago