☆64Feb 12, 2022Updated 4 years ago
Alternatives and similar repositories for threatshell
Users that are interested in threatshell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Virus names generator☆28Feb 10, 2015Updated 11 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)☆159Sep 20, 2021Updated 4 years ago
- Modified edition of cuckoo☆11Jan 12, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- Collection of scripts for different malware analysis tasks☆76Jul 15, 2019Updated 6 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 12 years ago
- Transforms for the AlienVault OTX service☆39Nov 3, 2016Updated 9 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- threat language parser☆59Apr 20, 2015Updated 11 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆25Mar 27, 2017Updated 9 years ago
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- ☆25Aug 14, 2015Updated 10 years ago
- Ponmocup Indicators of Compromise☆10Feb 4, 2016Updated 10 years ago
- Cyber Intel Management☆50Jan 25, 2018Updated 8 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Ruby bindings for the yara file analysis and classification library☆27Aug 26, 2011Updated 14 years ago
- Cli interface to threatcrowd.org☆21Jul 6, 2017Updated 8 years ago
- ☆37Feb 3, 2017Updated 9 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 10 years ago
- Forensic Dropbox☆22Jul 2, 2012Updated 13 years ago
- An open source framework for enterprise level automated analysis.☆393Jun 27, 2022Updated 3 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago
- Python Web App to Parse and Track Email and http Pcap Files.☆54Jul 14, 2013Updated 12 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- A Python command line argument to object parsing library for command line application development☆15Mar 23, 2016Updated 10 years ago
- A collection of Yara rules I have created so far☆16Oct 26, 2020Updated 5 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Aug 7, 2015Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- A framework that correlates Bro events☆18Oct 25, 2013Updated 12 years ago