Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-57.67%)
Python IocextractDefanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (+84.05%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-86.5%)
ThreatingestorExtract and aggregate threat intelligence.
Stars: ✭ 439 (+169.33%)
sqhunterA simple threat hunting tool based on osquery, Salt Open and Cymon API
Stars: ✭ 64 (-60.74%)
OSINT-BrazucaRepositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Stars: ✭ 508 (+211.66%)
pyc2bytecodeA Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (-57.06%)
Oie ResourcesA curated list of Open Information Extraction (OIE) resources: papers, code, data, etc.
Stars: ✭ 283 (+73.62%)
Freki🐺 Malware analysis platform
Stars: ✭ 285 (+74.85%)
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+2038.04%)
CowrieCowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Stars: ✭ 3,810 (+2237.42%)
MurMurHashThis little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-51.53%)
IronNetTRThreat research and reporting from IronNet's Threat Research Teams
Stars: ✭ 36 (-77.91%)
MimirOSINT Threat Intel Interface - CLI for HoneyDB
Stars: ✭ 104 (-36.2%)
StalkphishStalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (+57.06%)
HubDataset format for AI. Build, manage, & visualize datasets for deep learning. Stream data real-time to PyTorch/TensorFlow & version-control it. https://activeloop.ai
Stars: ✭ 4,003 (+2355.83%)
DatasetsA repository of pretty cool datasets that I collected for network science and machine learning research.
Stars: ✭ 302 (+85.28%)
rstthreatsAggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
Stars: ✭ 17 (-89.57%)
Datastream.ioAn open-source framework for real-time anomaly detection using Python, ElasticSearch and Kibana
Stars: ✭ 814 (+399.39%)
VfeedThe Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+406.75%)
SysmontoolsUtilities for Sysmon
Stars: ✭ 903 (+453.99%)
Php MlPHP-ML - Machine Learning library for PHP
Stars: ✭ 7,900 (+4746.63%)
DataconfsA list of conferences connected with data worldwide.
Stars: ✭ 36 (-77.91%)
Vulnerability Data ArchiveWith the hope that someone finds the data useful, we periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
Stars: ✭ 63 (-61.35%)
SetlA simple Spark-powered ETL framework that just works 🍺
Stars: ✭ 79 (-51.53%)
SSHapendoesCapture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-80.98%)
Chatterinternet monitoring osint telegram bot for windows
Stars: ✭ 123 (-24.54%)
seahorseELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)
Stars: ✭ 31 (-80.98%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-88.96%)
freki🐺 Malware analysis platform
Stars: ✭ 327 (+100.61%)
MalwareHashDBMalware hashes for open source projects.
Stars: ✭ 31 (-80.98%)
Data Science HacksData Science Hacks consists of tips, tricks to help you become a better data scientist. Data science hacks are for all - beginner to advanced. Data science hacks consist of python, jupyter notebook, pandas hacks and so on.
Stars: ✭ 273 (+67.48%)
pybinaryedgePython 3 Wrapper for the BinaryEdge API https://www.binaryedge.io/
Stars: ✭ 16 (-90.18%)
Dbg PdsDeutsche Boerse's Financial Trading Public Data Set
Stars: ✭ 124 (-23.93%)
Eseur Code DataCode and data used to create the examples in "Evidence-based Software Engineering based on the publicly available data"
Stars: ✭ 340 (+108.59%)
ioc-fangerFang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .
Stars: ✭ 47 (-71.17%)
Osint collectionMaintained collection of OSINT related resources. (All Free & Actionable)
Stars: ✭ 809 (+396.32%)
HarpoonCLI tool for open source and threat intelligence
Stars: ✭ 679 (+316.56%)
SpiderfootSpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+4122.09%)
Otx mispImports Alienvault OTX pulses to a MISP instance
Stars: ✭ 45 (-72.39%)
Qriyou're invited to a data party!
Stars: ✭ 1,003 (+515.34%)
Ml PyxisTool for reading and writing datasets of tensors in a Lightning Memory-Mapped Database (LMDB). Designed to manage machine learning datasets with fast reading speeds.
Stars: ✭ 93 (-42.94%)
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-45.4%)
Threatbus🚌 The missing link to connect open-source threat intelligence tools.
Stars: ✭ 139 (-14.72%)
Openml RR package to interface with OpenML
Stars: ✭ 81 (-50.31%)
mail to mispConnect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.
Stars: ✭ 61 (-62.58%)
IntelowlIntel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
Stars: ✭ 2,114 (+1196.93%)
Misp DashboardA dashboard for a real-time overview of threat intelligence from MISP instances
Stars: ✭ 142 (-12.88%)
DnsmorphDomain name permutation engine written in Go
Stars: ✭ 148 (-9.2%)