AdmiralSYN-ACKbar / bulkcheckLinks
Script for running bulk checks via https://www.abuseipdb.com/. Available in Powershell with WinForms GUI, Python with Tkinter GUI and BASH.
☆142Updated last year
Alternatives and similar repositories for bulkcheck
Users that are interested in bulkcheck are comparing it to the libraries listed below
Sorting:
- Standard-Format Threat Intelligence Feeds☆125Updated this week
- ☆96Updated last month
- Fast IOC and YARA Scanner☆84Updated 5 years ago
- Powershell module for VMWare vSphere forensics☆156Updated last year
- A repo hosting the Markua content for the EZ Tools manuals hosted on Leanpub☆85Updated 3 months ago
- ☆88Updated 8 months ago
- Python Scanner for passing IP addresses and utilizing AbuseIPdb API to find bad IPs☆60Updated last month
- Cast is an installer for any compatible Saltstack based distribution like SIFT or REMnux☆131Updated this week
- ☆81Updated last year
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆109Updated this week
- Sample programs to access the API☆95Updated 6 months ago
- Get all my software☆178Updated 5 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 5 months ago
- The Office 365 Extractor is a tool that allows for complete and reliable extraction of the Unified Audit Log (UAL)☆264Updated 3 years ago
- A PowerShell incident response script for quick triage☆81Updated 3 years ago
- Conference presentations☆60Updated last month
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Indicators of Compromise☆233Updated last week
- MISP to Sentinel integration☆77Updated 3 weeks ago
- Tools for simulating threats☆197Updated 2 years ago
- ☆168Updated last week
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆159Updated 7 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆72Updated this week
- ☆67Updated 2 months ago
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆74Updated last year
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆145Updated 3 weeks ago
- A list of my personal projects☆177Updated 3 years ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆108Updated last year
- Windows Forensics Environment Builder☆163Updated 2 months ago