telekom-security / watchtowerLinks
Watchtower, monitoring your Slack workspaces.
☆16Updated 4 years ago
Alternatives and similar repositories for watchtower
Users that are interested in watchtower are comparing it to the libraries listed below
Sorting:
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- ☆29Updated this week
- CLI tools using Harpoon features☆21Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- collect logs and alerts from 37 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.☆16Updated last month
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Updated 4 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last week
- ☆24Updated 2 years ago
- Censys Maltego transforms! Take advantage of Censys transforms for Maltego to back your investigations with the most trusted Internet dat…☆38Updated last year
- Automate the regular transfer of AIS data into a MISP Server☆10Updated last year
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Home to the ActorTrackr source code☆29Updated 7 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Hashes of infamous malware☆26Updated last year
- ☆21Updated 2 years ago
- Best practices in threat intelligence☆47Updated 2 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 4 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆30Updated 4 years ago
- A simple ReST server to lookup threat actors (by name, synonym or UUID) and returning the corresponding MISP galaxy information about the…☆48Updated last year
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago