sroberts / jagerLinks
Hunting IOCs all day every day...
☆86Updated 2 years ago
Alternatives and similar repositories for jager
Users that are interested in jager are comparing it to the libraries listed below
Sorting:
- IOC Management and Visualization Tool☆48Updated 2 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 4 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Updated 5 years ago
- A set of templates for documenting threat intelligence☆75Updated 12 years ago
- Cyber Intel Management☆50Updated 7 years ago
- Mass static malware analysis tool☆95Updated 3 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆97Updated 9 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆133Updated 9 years ago
- InvestigationPlaybookSpec☆72Updated 8 years ago
- A modular Python application to pull intelligence about malicious files☆123Updated 4 years ago
- Python IOC Editor☆63Updated 10 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆83Updated 10 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated 2 years ago
- Tools for the Computer Incident Response Team☆147Updated 8 years ago
- Multithreaded threat Intelligence gathering built with Python3☆177Updated 7 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆68Updated 10 years ago
- Credential Phish Analysis and Automation☆97Updated 7 years ago
- Malware/IOC ingestion and processing engine☆107Updated 7 years ago
- stoQ Public Plugins☆71Updated 2 years ago
- Some IR notes☆73Updated 9 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆156Updated 5 months ago
- ☆37Updated 8 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Updated 2 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Various tools and scripts☆43Updated 3 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 10 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Updated 10 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Updated 7 years ago