AbuseHelper is an open-source framework for receiving and redistributing abuse feeds and threat intel. Running tests & linter We run automated tests (for Python 2.6, 2.7 and PyPy) and flake8 linter for each repository push. View the logs at https://circleci.com/gh/abusesa/abusehelper. To run the tests locally you need to have tox installed (for example via pip install tox). Then, while in the project directory, run: $ tox Changelog See CHANGELOG.md. Security Announcements AbuseHelper Security Announcement 2016-01. Summary: Multiple places failed to check X.509 certificates leading to possibility to MITM connections. Community extensions This project provides the core AbuseHelper functionality, including choice bots and tools. The AbuseHelper Community repository builds upon the core, for example by offering a fine selection of community-maintained bots. License Files are (c) respective copyright holders if named in the specific file, everything else is current (c) by Synopsys, Inc. Everything is licensed under MIT license, see LICENSE.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
The Ransomware Tool Matrix is a repository that lists and categorizes tools used by ransomware gangs, aiding in threat hunting, incident response, and adversary emulation.
Automatic YARA rule generator based on Koodous reports with limited false positives.
Container of 200 Windows EVTX samples for testing detection scripts and training on DFIR.
A free and open-source OSINT framework for gathering and analyzing data from various sources
A collection of Yara rules licensed under the DRL 1.1 License.
Create deceptive webpages to deceive and redirect attackers away from real websites by cloning them.