Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
☆46Nov 1, 2021Updated 4 years ago
Alternatives and similar repositories for DomainCAT
Users that are interested in DomainCAT are comparing it to the libraries listed below
Sorting:
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- ☆14Aug 21, 2022Updated 3 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Uptime checker for tor hidden services☆12Feb 14, 2018Updated 8 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- A lightweight python system dashboard written in cherry py delivered over the web.☆10Sep 20, 2022Updated 3 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- Converting data from services like Censys and Shodan to a common data model☆52Updated this week
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- sKaleQL is an opinionated template repository for managing, executing, and organizing Kusto Query Language (KQL) queries against Azure Lo…☆19May 20, 2025Updated 9 months ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- Python code examples for working with the Slack API. 2.x and 3.x compatible code.☆13May 19, 2016Updated 9 years ago
- ☆29Oct 18, 2022Updated 3 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- ☆12Oct 2, 2022Updated 3 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- ☆13Feb 29, 2020Updated 6 years ago
- Bulk hostname lookup using shodan☆14Jun 1, 2022Updated 3 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- a brainfuck interpreter written in bash☆14Apr 22, 2016Updated 9 years ago
- Automating SQL Injection in a list of URLs or Request Files☆13Aug 8, 2016Updated 9 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Jan 15, 2016Updated 10 years ago
- Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed☆14Oct 8, 2019Updated 6 years ago
- 🕷 aircrack-ng - wifi network security collection dockerized☆14Dec 1, 2016Updated 9 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 9 months ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago