GlacierSheep / DomainBlockListLinks
This is a threat intelligence automatic crawling tool that also contains some high-value threat intelligence.
☆21Updated 4 years ago
Alternatives and similar repositories for DomainBlockList
Users that are interested in DomainBlockList are comparing it to the libraries listed below
Sorting:
- Quickly generate suricata rules for IOCs☆28Updated 4 years ago
- Suricata rules for the new critical vulnerabilities☆83Updated 4 years ago
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆107Updated 4 years ago
- Suricata rules for network anomaly detection☆173Updated last week
- The OTX Suricata Rule Generator can be used to create the rules and configuration for Suricata to alert on indicators from your OTX accou…☆112Updated last year
- Collection of Suricata rule sets that I use modified to my environments.☆40Updated 5 years ago
- Simple web shell scanner written in Golang.☆89Updated 6 years ago
- ☆35Updated last year
- Malware Sinkhole List in various formats☆102Updated 3 years ago
- 威胁检测规则集☆15Updated 6 years ago
- Repository of yara rules☆48Updated 10 years ago
- Explore Indicators of Compromise Automatically☆97Updated 5 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- ☆57Updated last year
- ☆39Updated last year
- ☆44Updated 2 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆158Updated 6 months ago
- Web shell scanner and analyzer.☆112Updated 2 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Updated 2 years ago
- A commercial grade threat intelligence feed thats validated and updated every half hour.☆19Updated 2 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- Active C2 IoCs☆99Updated 2 years ago
- zeek-scripts☆45Updated 6 years ago
- Suricata rule and intel index☆32Updated last month
- POOPAK - TOR Hidden Service Crawler☆136Updated last year
- Basic RDP honeypot script☆32Updated 2 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Updated 6 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 8 months ago
- ATT&CK Evaluations website (DEPRECATED)☆60Updated 4 years ago