Indicator Extractor
☆141Jul 14, 2018Updated 7 years ago
Alternatives and similar repositories for cacador
Users that are interested in cacador are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hunting IOCs all day every day...☆89Sep 26, 2023Updated 2 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- DPS' Lightweight Investigation Notebook☆434Dec 31, 2023Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Cli interface to threatcrowd.org☆21Jul 6, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33May 14, 2016Updated 9 years ago
- Defanged Indicator of Compromise (IOC) Extractor.☆576Aug 28, 2024Updated last year
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Log Examination Tool☆27Oct 11, 2016Updated 9 years ago
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- Bit9 + Carbon Black Threat Intelligence☆81Mar 9, 2016Updated 10 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- threat language parser☆59Apr 20, 2015Updated 11 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- Search pastebin for keywords using python☆33Mar 12, 2012Updated 14 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- ☆64Feb 12, 2022Updated 4 years ago
- ☆30Feb 25, 2017Updated 9 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆557May 9, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Volatility Plugins☆22May 1, 2015Updated 11 years ago
- An open source framework for enterprise level automated analysis.☆393Jun 27, 2022Updated 3 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 9 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 11 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Feb 20, 2017Updated 9 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- integrating bro into yara☆33Dec 9, 2014Updated 11 years ago
- Scripts for dealing with various ek's☆69Feb 2, 2017Updated 9 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- 16,432 Free Yara rules created by☆388Jun 1, 2019Updated 6 years ago
- Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds☆178Oct 19, 2015Updated 10 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Just-Metadata is a tool that gathers and analyzes metadata about IP addresses. It attempts to find relationships between systems within …☆630Jun 25, 2024Updated last year