A homebrewed cyber threat intelligence solution
☆20Nov 20, 2012Updated 13 years ago
Alternatives and similar repositories for sapho
Users that are interested in sapho are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 13 years ago
- NOISE creates "real-looking" text based upon a collection of reference texts, which can then be used in emails, tweets, web searches, IRC…☆15Apr 7, 2015Updated 10 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 9 months ago
- Next major release of sniffMyPackets - Now with added packet loving☆12Mar 19, 2015Updated 11 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Bro Snippets☆21Nov 7, 2014Updated 11 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- [DEFUNCT - do not use, insecure!] Communication for the 21st century activist.☆16Aug 5, 2025Updated 7 months ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- [UNMAINTAINED] A ruby tumblog☆25Jun 20, 2011Updated 14 years ago
- A PHP5 class library that offers a very easy, yet powerful way to handle uploading of files submitted via a form.☆37Dec 17, 2018Updated 7 years ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- The encrypted steganography filesystem☆42Jan 12, 2011Updated 15 years ago
- Incident Response Report Using GitHub-Sphinx☆20Oct 28, 2019Updated 6 years ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- Auto-follows users who tweet particular keywords☆31May 30, 2009Updated 16 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- Core server components for Assemblyline 4 (Alerter, dispatcher, expiry, ingester, scaler, updater, ...)☆21Updated this week
- Files from Zeronights presentation.☆28Nov 23, 2012Updated 13 years ago
- Knockout Competition Stats Collector☆13Mar 2, 2012Updated 14 years ago
- Access My Info Frontend☆12Oct 16, 2019Updated 6 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆13Jun 4, 2020Updated 5 years ago
- Generates visualizations from the output of flow tools such as SiLK.☆35Dec 8, 2016Updated 9 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆62Jan 6, 2023Updated 3 years ago
- Library to parse and load EXIF (JPEG) image files and meta data, and redact the images for privacy.☆17Mar 31, 2012Updated 13 years ago
- web.py is a web framework for python that is as simple as it is powerful.☆19Nov 16, 2023Updated 2 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- Cyber Threat Intelligence Feeds☆98Sep 26, 2016Updated 9 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Jul 5, 2021Updated 4 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Jan 6, 2021Updated 5 years ago
- Compare multiple log formats against malware reputation lists.☆88Jul 27, 2017Updated 8 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- A tool to generate Snort rules based on public IP reputation data☆56Aug 28, 2013Updated 12 years ago