cybercercher's repositories
awesome-jupyter
A curated list of awesome Jupyter projects, libraries and resources
client-python
OpenCTI Python client
connectors
OpenCTI connectors
crits
CRITs - Collaborative Research Into Threats
crits_services
CRITs Services Collection
CSV-to-JSON_and_JSON-to-CSV_RoundTrip_Converter
we examined CSV and JSON file formats. We wrote code to manually convert a specific CSV file to a specific JSON in the process. We the functions to do a "round-trip" (CSV->JSON->CSV or JSON->CSV->JSON) on the Consumer Complaint Database data found at https://catalog.data.gov/dataset/consumer-complaint-database#topic=consumer_navigation
docker-elk
The Elastic stack (ELK) powered by Docker and Compose.
elk-upgrade
Elastic Stack Upgrade with Ansible
fame
FAME Automates Malware Evaluation
fame_modules
Community modules for FAME
FIR
Fast Incident Response
IntelOwl
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
MISP
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
mixbox
A library of common code leveraged by python-cybox, python-maec, and python-stix
open-semantic-search
Open Source research tool to search, browse, analyze and explore large document collections by Semantic Search Engine and Open Source Text Mining & Text Analytics platform (Integrates ETL for document processing, OCR for images & PDF, named entity recognition for persons, organizations & locations, metadata management by thesaurus & ontologies, search user interface & search apps for fulltext search, faceted search & knowledge graph)
opencti
Open Cyber Threat Intelligence Platform
pyeti
Python bindings for Yeti's API
python-cybox
A Python library for parsing, manipulating, and generating CybOX content.
python-stix
A Python library for parsing, manipulating, and generating STIX content.
sovereign
A set of Ansible playbooks to build and maintain your own private cloud: email, calendar, contacts, file sync, IRC bouncer, VPN, and more.
ThreatPursuit-VM
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
thug
Python low-interaction honeyclient
twitter4j
Twitter4J is an open-sourced, mavenized and Google App Engine safe Java library for the Twitter API which is released under the Apache License 2.0.
wandora
Wandora is a general purpose information extraction, management and publishing application based on Topic Maps and Java.
web-clipper
For Notion,OneNote,Bear,Yuque,Joplin。Clip anything to anywhere
yeti
Your Everyday Threat Intelligence
yetigo
Maltego Transforms for Yeti
YetiToElastic
YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack