Python-based tool for analyzing URLs and detecting potential threats using various cybersecurity services.
-
Updated
Apr 24, 2024 - Python
Python-based tool for analyzing URLs and detecting potential threats using various cybersecurity services.
End 2 end pipeline
A python bot that uses the Pyrogram API Framework to take a list of Telegram channels and groups and joins them.
CTI Reporter is a small flask wiki to help index threat intelligence data
A fork of the original mailhoney SMTP honeypot rewritten due to library deprecation
Python-based application designed to scan URLs and assess website risks through an API
This repository provides CVE vulnerability download using NVD feeds
cybercure.ai python SDK to digest cybercure free cyber threat intelligence feeds
[ Non-Functional Version ] Lolinck is an open source API that use machine learning to detect if a website is safe or not. It can detect NSFW, phishing, malware, ip logging and more.
Tools for analyzing cyber-security reports and extract information
Threat actor and malware names simple normalization
an IPEnumerationTool combining Shodan and Censys APIs for comprehensive insights. Uncover vulnerabilities, enhance cybersecurity, and streamline analysis with merged results and deduplication.
Apache log analyzer, lightweight log parser for cybersecurity analyst.
This script searches messages containing specified search terms in Telegram channels the user is a member of. Saves the results into a file. Then uploads the file and sends an alert to a Slack channel.
a recon webapp built with python's Flask designed to gather data about currently used large-scale web attacks and optionally attempt to stall bots.
This repository holds: 1) custom STIX 2.1 Objects DOGESEC have created, and 2) generic STIX 2.1 Objects that are imported to different DOGESEC products.
first project in python pygame
Pwn The Jewels is a Discord bot oriented for cyber threat analysts, allowing them to monitor various services without a paywall and with the self-host option.
WhatHitMe is a Python3 tool which provides the possible Groups and their attributed Campaigns that may have attacked you in an incident, based on specific Techniques and Software you have identified (MITRE ATT&CK). It supports both enterprise, mobile and ICS matrixes. It also provides searches to known sources for these Groups for insight!
Add a description, image, and links to the cyber-threat-intelligence topic page so that developers can more easily learn about it.
To associate your repository with the cyber-threat-intelligence topic, visit your repo's landing page and select "manage topics."