TekDefense-Automater
IP analyzer
Automates OSINT analysis of IP addresses and hashes by querying multiple data sources
Automater - IP URL and MD5 OSINT Analysis
534 stars
60 watching
121 forks
Language: Python
last commit: 3 months ago Related projects:
Repository | Description | Stars |
---|---|---|
hatriot/zarp | A network attack tool designed to manage and analyze local networks | 1,446 |
withsecurelabs/linuxcatscale | Automates incident response collection and processing on Linux hosts. | 267 |
tomchop/malcom | Analyzes network traffic to detect malware communication and behavior | 1,155 |
ankur8931/asap | A toolset for automating security analysis and penetration testing | 22 |
dhoelzer/showmethepackets | Tools and resources for network monitoring and analysis used in the SANS SEC503 course | 209 |
vadims06/isiswatcher | A tool for monitoring and analyzing IS-IS topology changes in network devices. | 4 |
detuxsandbox/detux | Analyzes and captures malware traffic on Linux sandboxed environments using QEMU hypervisor and various CPU architectures. | 260 |
telekom-security/malware_analysis | An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
mrphrazer/hitb2021ams_deobfuscation | Automated deobfuscation of malware code using symbolic execution and simplification techniques | 71 |
punch-cyber/stoq | An automation framework that simplifies data analysis and processing tasks | 393 |
ch3k1/squidmagic | Analyzes web-based network traffic to detect malicious command and control servers using Squid proxy server and Spamhaus | 78 |
akestoridis/zigator | Analyzes and manipulates data from Zigbee and Thread networks to identify security vulnerabilities and simulate attacks. | 29 |
antirez/hping | A tool to send custom TCP/IP packets and display target replies | 1,444 |
eremit4/cs-discovery | Detects malicious servers in network traffic by analyzing encoded byte patterns | 20 |
uqcyber/coldpress | Automates malware analysis workflow by extracting features and indicators of compromise from malicious files using various tools and libraries. | 16 |