API to use Cymru services
☆27Dec 6, 2013Updated 12 years ago
Alternatives and similar repositories for python-cymru-services
Users that are interested in python-cymru-services are comparing it to the libraries listed below
Sorting:
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Python script that gets IOC from MISP and converts it into BRO intel files.☆13Apr 17, 2016Updated 9 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Some yara rules and tools☆16Feb 12, 2014Updated 12 years ago
- ☆14May 14, 2018Updated 7 years ago
- swffile.py - SWF file parser module in Python☆28Apr 4, 2016Updated 9 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- Breaching physical security, and generally causing mayhem, with wireless signals☆15Mar 19, 2017Updated 8 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- Pythonic way to work with the galaxies defined there: https://github.com/MISP/misp-galaxy☆20Feb 10, 2026Updated 2 weeks ago
- I agree with mass surveillance, but not government corruption. This is the result.☆11Jun 20, 2020Updated 5 years ago
- A warehouse for your malware☆20Feb 25, 2013Updated 13 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- IOC-EDT is an open source web based tool for creating indicators of compromise in the OpenIOC (http://www.openioc.org) format.☆18May 10, 2014Updated 11 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Feb 20, 2015Updated 11 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- ☆22Jun 18, 2015Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- A repository for development of the TAXII Specifications. For official releases, please see http://taxiiproject.github.io/releases/☆41Nov 29, 2015Updated 10 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- Bitdefender's Linux.Encoder.1 Decrypter☆17Nov 17, 2015Updated 10 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- FLARM receiver for GNU Radio☆30Jan 30, 2024Updated 2 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆25May 29, 2023Updated 2 years ago
- Attacks against weak 802.11 Random Number Generators☆24Feb 8, 2017Updated 9 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Live SSH/SSL/TLS decryption - extraction of secret keys from live process memory☆110Oct 29, 2015Updated 10 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Parse Yara rules and operate over them more easily.☆51Jan 7, 2019Updated 7 years ago
- Stuff for Prosa binary reversing, exploitation and shellcoding workshop☆25Sep 28, 2020Updated 5 years ago
- Scalable Binary Data Extraction in Hadoop☆144Jul 14, 2014Updated 11 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- A command line utility to aid in using autofocus for IR and research☆27Oct 22, 2019Updated 6 years ago
- MISP Workbench☆28Oct 19, 2016Updated 9 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago