Malware/IOC ingestion and processing engine
☆110Nov 20, 2018Updated 7 years ago
Alternatives and similar repositories for MalPipe
Users that are interested in MalPipe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A web-based tool to assist the work of the intuitive threat analysts.☆114Feb 9, 2019Updated 7 years ago
- A framework for receiving and redistributing abuse feeds☆125Sep 27, 2019Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54May 3, 2024Updated last year
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Defanged Indicator of Compromise (IOC) Extractor.☆571Aug 28, 2024Updated last year
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 9 months ago
- An open source framework for enterprise level automated analysis.☆393Jun 27, 2022Updated 3 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- Collecting & Hunting for IOCs with gusto and style☆241Aug 1, 2021Updated 4 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆556May 9, 2023Updated 2 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago
- Dockerized REST service to look up URLs in Google Safe Browsing v4 API☆76Feb 2, 2022Updated 4 years ago
- Repo with some info about malware in IoT☆15May 31, 2018Updated 7 years ago
- An analytical framework for network traffic and behavioral analytics☆455Dec 7, 2022Updated 3 years ago
- Frontend for Codex Gigas☆21Mar 6, 2017Updated 9 years ago
- A modular Python application to collect intelligence for malicious hosts.☆274Apr 13, 2021Updated 4 years ago
- Drupal Honeypot☆58Jul 14, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Centralized Firewall Control☆21Feb 5, 2018Updated 8 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆410Apr 21, 2020Updated 5 years ago
- Lama, the application that does not mache these words.☆23Jun 9, 2019Updated 6 years ago
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Oct 25, 2018Updated 7 years ago
- A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.☆481Nov 15, 2024Updated last year
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Credential Phish Analysis and Automation☆99Aug 22, 2018Updated 7 years ago
- Windows link file (shortcuts) examiner☆68Jun 9, 2024Updated last year
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago