thomaspatzke / EQUELLinks
An Elasticsearch QUEry Language
☆57Updated 8 years ago
Alternatives and similar repositories for EQUEL
Users that are interested in EQUEL are comparing it to the libraries listed below
Sorting:
- ☆75Updated 3 years ago
- Automated install scripts for Cuckoo sandbox☆38Updated 8 years ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago
- Python interface to the CRITs API☆22Updated 8 years ago
- Some IR notes☆73Updated 9 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Ragpicker is a Plugin based malware crawler with pre-analysis and reporting functionalities. Use this tool if you are testing antivirus p…☆94Updated 10 years ago
- Scripts for Bro IDS and ELK Stack☆57Updated 10 years ago
- ☆64Updated 3 years ago
- The Seeker of IOC☆131Updated 5 years ago
- A Windows Event Processing Utility☆47Updated 7 years ago
- An ICAP Server with yara scanner for URL and content.☆58Updated last year
- Cyber Defence Monitoring Course Suite :: Suricata, Bro, Moloch☆61Updated 8 years ago
- A Python library and command line tools to provide interactive log visualization.☆144Updated 3 years ago
- Quick tool for using Hybrid Analysis API on command line..☆17Updated 8 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Updated 3 months ago
- SANS Hunting on the Cheap☆36Updated 9 years ago
- Malware Repository Framework☆99Updated 7 years ago
- integrating bro into yara☆33Updated 11 years ago
- ☆22Updated 8 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Updated 4 years ago
- Command line tool for scanning streams within office documents plus xor db attack☆126Updated 2 years ago
- ☆17Updated 8 years ago
- Various Bro scripts☆96Updated 9 years ago
- Reconstruct process trees from event logs☆147Updated 5 years ago
- Various public documents, whitepapers and articles about APT campaigns☆55Updated 9 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Updated 7 years ago
- A collection of scripts to initialize a windows VM to run all the malwares!☆107Updated 5 years ago
- PowerShell No Agent Hunting☆111Updated 7 years ago