Scripts for making Hubot a CND Sidekick
☆59Apr 14, 2016Updated 9 years ago
Alternatives and similar repositories for hubot-vtr-scripts
Users that are interested in hubot-vtr-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 11 years ago
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- CrowdStrike Feed Management System. CrowdFMS is a framework for automating collection and processing of samples from VirusTotal, by lever…☆133Nov 13, 2018Updated 7 years ago
- ☆19Jul 24, 2021Updated 4 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- Automated PAN Firewall Custom URL Category using Python and PAN API☆14Dec 16, 2015Updated 10 years ago
- ☆17Dec 9, 2014Updated 11 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- Set of python scripts to analyse PE32/PE64 binaries and to extract VB 5/6 headers and Visual Basic p-code functions.☆49Jun 29, 2015Updated 10 years ago
- Website letting users query information from many different security threat intelligence APIs☆26Sep 30, 2020Updated 5 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- ☆15Jan 20, 2016Updated 10 years ago
- A Slack bot to add security info to messages containing URLs, hashes and IPs☆71Aug 28, 2024Updated last year
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- Threat Intelligence APIs☆281Aug 14, 2023Updated 2 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- Network Scout (NS) is an extension to Artillery. NS allows you to access log files from multiple clients.☆21May 2, 2016Updated 9 years ago
- Splunk csv to KVStore ES Threat Intel☆11Jul 11, 2016Updated 9 years ago
- 🚨 Slack bot for cyber-security phishing☆21Jan 22, 2019Updated 7 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 10 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Sometimes you just want to flip a damn table.☆12Dec 5, 2017Updated 8 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Time to see some victorious images!☆13Jun 14, 2016Updated 9 years ago
- blinkenlights update of our refrigerator. Small 15x10 LED matrix with WS2812b LED strips + WeMos d1 mini (ESP8266 devboard) + FastLED + L…☆10Nov 30, 2016Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- Honeynet Project generic authenticated datafeed protocol☆218Oct 19, 2023Updated 2 years ago
- Modern Honey Network App for Splunk☆50Sep 30, 2019Updated 6 years ago
- Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.☆60Dec 6, 2020Updated 5 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago