Minimal Indicator Storage System
☆11Feb 8, 2021Updated 5 years ago
Alternatives and similar repositories for IntelDB
Users that are interested in IntelDB are comparing it to the libraries listed below
Sorting:
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- SoC-independent part of the iso7816 stack☆13Feb 28, 2024Updated 2 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- Repository of Cofense Coronavirus Phishing Yara Rules (details can be found here: https://cofense.com/solutions/topic/coronavirus-infocen…☆10Jul 7, 2020Updated 5 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Register your Kubernetes IPs to monitor.shodan.io☆18Oct 28, 2022Updated 3 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- ☆19Jul 21, 2022Updated 3 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- ☆18Mar 26, 2024Updated last year
- IDAPython script in order to auto-rename subs☆20May 17, 2017Updated 8 years ago
- A miniature model of the Typescript compiler☆15Jan 5, 2022Updated 4 years ago
- Win32 Python code for tracing malware activities on infected hosts☆26Jul 4, 2016Updated 9 years ago
- Utilities for working with vivisect☆26Oct 1, 2025Updated 5 months ago
- ☆22Dec 22, 2020Updated 5 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated last month
- Symbolic analysis of discrete dynamical systems☆24Dec 11, 2023Updated 2 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Web Application for domain name monitoring / alerting☆64Aug 1, 2024Updated last year
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- Cisco Threat Intellligence Model☆73Feb 18, 2026Updated last week
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- ☆27Aug 25, 2020Updated 5 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆33Jan 14, 2026Updated last month
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 2 years ago
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated 2 months ago