spitzbuaamy / AbuseCH-to-MISPView external linksLinks
Import AbuseCH IOC Feeds into MISP
☆12Feb 17, 2021Updated 5 years ago
Alternatives and similar repositories for AbuseCH-to-MISP
Users that are interested in AbuseCH-to-MISP are comparing it to the libraries listed below
Sorting:
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- ☆11Apr 25, 2021Updated 4 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- ☆20Jan 28, 2026Updated 2 weeks ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆184Oct 3, 2025Updated 4 months ago
- CSIRT Jump Bag☆27Apr 25, 2024Updated last year
- Defensomania is a security monitoring and incident response card game.☆64May 24, 2023Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆75Jan 18, 2022Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Feb 14, 2025Updated last year
- Browser Shortcuts for Cyber Security Related Online Services☆78Feb 4, 2021Updated 5 years ago
- Reads and prints information from the website MalAPI.io☆39Jan 18, 2022Updated 4 years ago
- The All In One Script!☆10Feb 12, 2020Updated 6 years ago
- Convert SRT file to Audacity supported Label.☆11Sep 4, 2020Updated 5 years ago
- CWE-1003 日本語訳☆10Feb 16, 2023Updated 3 years ago
- Generate GSM authentication triplets (as per 3GPP TS 55.205)☆16Jan 11, 2018Updated 8 years ago
- A script to copy your Highlights from an Amazon Kindle device☆14Apr 27, 2024Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆45Nov 10, 2025Updated 3 months ago
- Python scripts for Malware Bazaar☆157Jun 3, 2024Updated last year
- 5G Orchestration made easy☆15Apr 29, 2025Updated 9 months ago
- Spiders a website using the darknet via Tor☆12Jun 18, 2017Updated 8 years ago
- NetPassage allows you to expose a web service, such as Microsoft Bot running on your local machine or on the private network to the publi…☆15Jul 20, 2023Updated 2 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 3 years ago
- A detailed list of potentially dangerous file extensions☆17Jun 18, 2025Updated 7 months ago
- repository containing some nmap scripts☆16Jan 15, 2021Updated 5 years ago
- ☆15May 15, 2025Updated 9 months ago
- A simple GTK based note-taking app written in Python.☆11Aug 1, 2022Updated 3 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- ISUCON用代わりにsshしていろいろやってくれるツール☆11Nov 25, 2023Updated 2 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Build your own cloud virtual machine lab☆12Nov 25, 2025Updated 2 months ago
- A simple bash YouTube podcatcher☆10Jul 3, 2019Updated 6 years ago
- Tools that trigger False Positive AV alerts☆53Dec 24, 2024Updated last year
- A Bloom filter & Golang server for checking passwords against the "Have I Been Pwned 2.0" password database.☆52Apr 15, 2022Updated 3 years ago
- DuckyScript payloads for the USB Nugget☆46Dec 27, 2024Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 8 months ago