scVENUS / PeekabooAVLinks
Peekaboo Extended Email Attachment Behavior Observation Owl
☆69Updated 2 weeks ago
Alternatives and similar repositories for PeekabooAV
Users that are interested in PeekabooAV are comparing it to the libraries listed below
Sorting:
- server for indexing and querying passive DNS observations☆47Updated 2 months ago
- The Cyber Security Platform MeliCERTes is part of the European Strategy for Cyber Security. MeliCERTes is a network for establishing conf…☆32Updated 3 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆90Updated 3 weeks ago
- The paste analyzer☆27Updated 4 years ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆69Updated 5 months ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆63Updated 5 years ago
- This python based milter (mail-filter) checks an incoming mail for suspicious VBA macro code in MS 20xx Office attachments (doc, xls, ppt…☆39Updated 4 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35Updated 4 months ago
- S4A main repository. SaltStack states, install script and build scripts☆26Updated last week
- ☆34Updated 5 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Updated 3 years ago
- OwlH Master API Web User Interface☆12Updated last year
- ☆16Updated last year
- Outlook add-in companion to report suspicious mail easily☆132Updated 3 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Community modules for FAME☆65Updated last week
- Generates mappings between IANA TLS hex values and their corresponding cipher names in GnuTLS, NSS, and OpenSSL☆24Updated 8 months ago
- ☆28Updated 2 months ago
- ioc2rpz is a place where threat intelligence meets DNS.☆111Updated 7 months ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆36Updated 2 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 3 years ago
- A Passive SSH back-end and scanner.☆104Updated 3 months ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- A curated list of awesome malware analysis tools and resources☆21Updated 7 years ago
- IRMA is an asynchronous & customizable analysis system for suspicious files.☆273Updated 2 years ago
- because twin clams are better than one clam?☆29Updated this week
- Simple yara rule manager☆66Updated 2 years ago
- Base components for Assemblyline 4 (Datastore, ODM, Filestore, Remote Datatypes, utils function, etc...)☆69Updated this week
- ☆33Updated this week