xme / toolboxLinks
Miscelaneous useful scripts for my day to day projects
☆123Updated 5 years ago
Alternatives and similar repositories for toolbox
Users that are interested in toolbox are comparing it to the libraries listed below
Sorting:
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆143Updated 7 years ago
- pastebin.com Content Monitoring Tool☆194Updated 13 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆127Updated 10 years ago
- Credential Phish Analysis and Automation☆98Updated 7 years ago
- Harbinger Threat Intelligence☆83Updated 10 years ago
- A modular Python application to pull intelligence about malicious files☆123Updated 5 years ago
- The Seeker of IOC☆131Updated 5 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98Updated 9 years ago
- Query and report user logons relations from MS Windows Security Events☆243Updated 7 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Network Forensics Bro scripts & pcap samples☆63Updated 11 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 8 months ago
- A framework for receiving and redistributing abuse feeds☆125Updated 6 years ago
- Bro scripts to be shared with the community☆111Updated 12 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆156Updated 5 months ago
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆141Updated 2 years ago
- Tools for the Computer Incident Response Team☆148Updated 8 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 6 years ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- ☆38Updated 7 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆52Updated 10 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆183Updated 2 years ago
- Differential Analysis of Malware in Memory☆214Updated 8 years ago
- Threat Feed Aggregation, Made Easy☆169Updated 5 years ago
- Cyber Intel Management☆50Updated 7 years ago
- Modern Honey Network App for Splunk☆50Updated 6 years ago
- a Malware/Threat Analyst Desktop☆89Updated 10 years ago
- Mass static malware analysis tool☆95Updated 3 years ago