Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automated phishing domain investigations. However it can be used for every domain to gather all domain information needed. This can help to classify if a domain is malicious.
☆49Jan 1, 2026Updated 2 months ago
Alternatives and similar repositories for Domain-Response
Users that are interested in Domain-Response are comparing it to the libraries listed below
Sorting:
- Security Scripts and Sources for daily usage.☆69Jan 25, 2026Updated last month
- PowerShell Digital Forensics & Incident Response Scripts.☆772Jan 14, 2026Updated last month
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- Sentinel Logic Apps, Playbooks and Workbooks to automate enrichment, incident analysis and more.☆115Jan 18, 2026Updated last month
- Anteater is Reconnaissance tool for discovering interesting files and folders in a web application that most likely has been misconfigure…☆13Jun 12, 2024Updated last year
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆10Aug 9, 2020Updated 5 years ago
- A pure python, post-exploitation, data mining tool and remote administration tool for macOS. 🍎💻☆11Feb 22, 2017Updated 9 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆773Jan 28, 2025Updated last year
- KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunt…☆1,638Feb 22, 2026Updated last week
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 8 months ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Simulates a compromise in a cloud and container environment☆34Dec 18, 2024Updated last year
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Aug 6, 2019Updated 6 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Dec 29, 2025Updated 2 months ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆432Feb 18, 2026Updated 2 weeks ago
- A collection of various SIEM rules relating to malware family groups.☆70Jun 18, 2024Updated last year
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆150Feb 14, 2026Updated 2 weeks ago
- ReWrite of AChoir in Go for Cross Platform forensic artifact collection and processing☆41Updated this week
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Dec 13, 2022Updated 3 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 10 years ago
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- ☆50Jan 30, 2026Updated last month
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆127Apr 24, 2023Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆193Dec 20, 2024Updated last year
- Extract files off NTFS☆22Nov 1, 2014Updated 11 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆41Feb 4, 2023Updated 3 years ago
- Open-source Fabric templates for cybersecurity and compliance☆31Jan 13, 2025Updated last year