Notebooks
This repository is a collection of some of my Jupyter Notebook applied to cybersecurity and threat intelligence. If you want to play with the code you can run it here
Pulsedive Lookup Using MSTICpy
This notebook demonstrates how to use MSTICpy to query Pulsedive.
Published: 10 March 2023
ELK Threat Hunting
This notebook show how to connect to an ElasticSearch instance to retrieve the data and analyse them. The dataset used here is from MalwareBazaar.
Published: 10 September 2022
Malware Bazaar Lookup Using MSTICpy
This notebook demonstrates how to use MSTICpy to query the Malware Bazaar database.
Published: 12 August 2022
10 Python Libs for Malware Analysis and Reverse Engineering
This notebook demonstrates 10 python libraries useful for malware analysis and reverse engineering.
Published: 08 June 2022
Conti Leaks Analysis
This notebook demonstrates a simple way to analyze the Conti Leaks chat logs using Python and msticpy. It proposes a methodology for threat researchers and allows to extract relevant information using Python and visualization.
Published: 02 June 2022
VT Domain Hunting using MSTICpy
Notebook to hunt for domains relationship using msticpy.
Published: 19 May 2022
IoCExtractor using MSTICpy
POC to extract Indicator of Compromised from url using msticpy.
Published: 31 March 2022
Strings Similarity Experimentation
This notebook shows some experiementation with strings similarity using Jaccard distance, hashing and visualization.
Published: 25 July 2020
Support or Contact
You can contact me on Twitter: @fr0gger_