AdmiralSYN-ACKbar / bulkcheck
Script for running bulk checks via https://www.abuseipdb.com/. Available in Powershell with WinForms GUI, Python with Tkinter GUI and BASH.
☆129Updated last year
Alternatives and similar repositories for bulkcheck
Users that are interested in bulkcheck are comparing it to the libraries listed below
Sorting:
- Fast IOC and YARA Scanner☆79Updated 5 years ago
- Standard-Format Threat Intelligence Feeds☆112Updated this week
- ☆74Updated last week
- ☆70Updated last year
- Full of public notes and Utilities☆98Updated 3 months ago
- ☆83Updated 2 months ago
- SentinelOne STAR Rules☆60Updated 3 months ago
- Repository of SentinelOne Deep Visibility queries.☆127Updated 3 years ago
- ☆13Updated 2 months ago
- ☆58Updated last year
- Powershell module for VMWare vSphere forensics☆150Updated 6 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆137Updated 2 weeks ago
- MISP to Sentinel integration☆67Updated last month
- Tools for simulating threats☆183Updated last year
- Python Scanner for passing IP addresses and utilizing AbuseIPdb API to find bad IPs☆57Updated 5 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆46Updated 2 months ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆55Updated 5 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆87Updated last year
- LogRhythm PowerShell Toolkit☆51Updated 3 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆84Updated 3 months ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆152Updated 3 years ago
- ☆152Updated this week
- Indicators of Compromise☆195Updated last week
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆84Updated last year
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆132Updated last year
- The Business Email Compromise Guide sets out to describe 10 steps for performing a Business Email Compromise (BEC) investigation in an Of…☆256Updated 4 years ago
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆73Updated last year
- BulkStrike enables the usage of CrowdStrike Real Time Response (RTR) to bulk execute commands on multiple machines.☆42Updated 2 years ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆156Updated last month
- The Project can be used to integrate QRadar with MISP Threat Sharing Platform☆39Updated 3 years ago