API Tools
☆27Apr 18, 2016Updated 9 years ago
Alternatives and similar repositories for threatrecon
Users that are interested in threatrecon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- ☆22Jan 2, 2018Updated 8 years ago
- Search pastebin for keywords using python☆33Mar 12, 2012Updated 14 years ago
- ☆15May 2, 2015Updated 10 years ago
- Help summarize a PCAP file☆33Dec 27, 2011Updated 14 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Maltego transforms for the ThreatCrowd search API☆47Apr 11, 2018Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- Rapid7's Nexpose Maltego Transform Pack☆23Aug 11, 2013Updated 12 years ago
- CRITs IOC Visualization in Maltego☆28Jan 8, 2015Updated 11 years ago
- ☆22Apr 10, 2020Updated 5 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- A virtual PDF analysis framework☆17Jan 31, 2014Updated 12 years ago
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- Detect Phishing with Bro IDS☆18Feb 1, 2017Updated 9 years ago
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- Hidden monitoring and blocking Android apps☆10May 2, 2017Updated 8 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- Munk - Visualize Splunk Architecture in Maltego☆13Sep 19, 2014Updated 11 years ago
- Basic Maltego Transforms for looking up SSL certs and IP info from censys.io☆38Mar 14, 2017Updated 9 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- ☆13Nov 8, 2017Updated 8 years ago
- ☆17Mar 22, 2018Updated 8 years ago
- Yara rules for malware families seen as part of targeted threats project☆141Nov 17, 2016Updated 9 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- DNSDB query scripts☆75Jan 23, 2020Updated 6 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Threat Intelligence Quotient Test - Dataviz and Statistical Analysis of TI feeds☆177Oct 19, 2015Updated 10 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 8 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆11Mar 2, 2021Updated 5 years ago
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 13 years ago
- Fun with Amazon AWS and Maltego☆29Jun 5, 2017Updated 8 years ago
- Maltego transforms for the Steam community☆12Aug 5, 2017Updated 8 years ago