z3ndrag0n / forensicator-fate
Bringing DevOps to Forensics
☆34Updated 10 years ago
Alternatives and similar repositories for forensicator-fate:
Users that are interested in forensicator-fate are comparing it to the libraries listed below
- Threat Intelligence distribution☆30Updated 9 years ago
- CRITs IOC Visualization in Maltego☆27Updated 10 years ago
- Python interface to the CRITs API☆22Updated 8 years ago
- A set of templates for documenting threat intelligence☆74Updated 12 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Maltego Transform to put entities into MISP events☆27Updated 3 years ago
- Some IR notes☆73Updated 8 years ago
- Transforms for the AlienVault OTX service☆39Updated 8 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Updated 9 years ago
- Script for generating Bro intel files from pdf or html reports☆76Updated 9 years ago
- A Windows Event Processing Utility☆46Updated 7 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Updated 9 years ago
- Log Examination Tool☆26Updated 8 years ago
- Useful scripts, rules etc. for use with YARA☆27Updated 4 years ago
- InvestigationPlaybookSpec☆72Updated 7 years ago
- Python script to pull various IOCs from PDFs☆15Updated 10 years ago
- ☆37Updated 10 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Python IOC Editor☆62Updated 10 years ago
- Beholder is a shell script which installs and configures essentials to peer into your network activity.☆19Updated 7 years ago
- Public Maltego Transforms☆24Updated 7 years ago
- Extract information from MISP via the API☆15Updated 8 years ago
- Harbinger Threat Intelligence☆82Updated 9 years ago
- Automation for VirusTotal☆31Updated 8 years ago
- ☆36Updated 8 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆81Updated 9 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Updated 8 years ago
- ☆36Updated 8 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆51Updated 9 years ago