vz-risk / VerumView external linksLinks
Implementation of Context-Graph algorithms for graph enrichment and querying.
☆24Jul 24, 2015Updated 10 years ago
Alternatives and similar repositories for Verum
Users that are interested in Verum are comparing it to the libraries listed below
Sorting:
- revised "peHash: A Novel Approach to Fast Malware Clustering"☆21Jul 13, 2016Updated 9 years ago
- threat language parser☆60Apr 20, 2015Updated 10 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- A collection of scripts to look various things up in VERIS data such as VCDB.☆14Apr 27, 2017Updated 8 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 6 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆30Sep 26, 2014Updated 11 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20May 13, 2017Updated 8 years ago
- Malformity is a Maltego project based on the Canari framework for malicious binary and infrastructure research.☆115May 4, 2016Updated 9 years ago
- Python interface to the CRITs API☆22Mar 10, 2017Updated 8 years ago
- A running collection of resources for people who want to get started in machine learning and data science☆18Dec 22, 2016Updated 9 years ago
- DRAFT STIX specification documents for version 1.2☆20Oct 3, 2016Updated 9 years ago
- A Docker container that exposes tlspretense on a port.☆19Mar 24, 2023Updated 2 years ago
- AYY LMAO☆22Mar 26, 2016Updated 9 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- R package for working with VERIS data☆25Aug 4, 2023Updated 2 years ago
- Logging plugin to bro to send logs to a Kafka broker☆20Nov 29, 2017Updated 8 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Jan 26, 2026Updated 2 weeks ago
- Source codes related to the articles about OSINT. Using social media APIs and Python language.☆23Jan 9, 2019Updated 7 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- This is my vim configuration to work with Git + Puppet manifests☆19Feb 7, 2017Updated 9 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆92Apr 15, 2019Updated 6 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- ☆19Jul 24, 2021Updated 4 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆31Jul 9, 2012Updated 13 years ago
- Bringing DevOps to Forensics☆34Feb 4, 2015Updated 11 years ago
- Snort in a Docker Container☆31Mar 21, 2014Updated 11 years ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- A cyber threat intelligence server based on TAXII 2 and written in Golang☆32Sep 19, 2019Updated 6 years ago
- Threat Intelligence APIs☆282Aug 14, 2023Updated 2 years ago
- Interoperable Master Format (IMF) Validation Tool☆12Feb 8, 2016Updated 10 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- Unification of dnstwist + SQLite + Email reporting. Set it as a cron job that runs every hour, give it a list of domains and email addres…☆67Mar 6, 2018Updated 7 years ago
- Parse a report and import the events into MISP☆30Oct 19, 2015Updated 10 years ago
- Lite version of PDF X-RAY that uses no backend☆38Nov 11, 2011Updated 14 years ago
- Automatically scans for malicious proxies.☆31Mar 7, 2015Updated 10 years ago