Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking & Alerting plus API for automated queries (JSON/CSV/TXT)
☆159Sep 20, 2021Updated 4 years ago
Alternatives and similar repositories for WhoDat
Users that are interested in WhoDat are comparing it to the libraries listed below
Sorting:
- A content inspecting SMTP proxy☆17Jun 9, 2014Updated 11 years ago
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- Simple NGram Fast Indexer & Searcher☆37Jan 6, 2023Updated 3 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33May 14, 2016Updated 9 years ago
- Yara is awesome, but sometimes you need to manipulate the data streams you're scanning in different ways.☆98Oct 21, 2014Updated 11 years ago
- CRITs - Collaborative Research Into Threats☆21Mar 13, 2019Updated 6 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- A Python library for being a CND Batman....☆35Oct 29, 2015Updated 10 years ago
- ☆305May 28, 2017Updated 8 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Tagging and annotation framework for scan data☆101Oct 16, 2018Updated 7 years ago
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 9 years ago
- Compare multiple log formats against malware reputation lists.☆88Jul 27, 2017Updated 8 years ago
- set of entities for Maltego including common STIX objects and several flavors of kill chain.☆11May 6, 2015Updated 10 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated last month
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- ☆64Feb 12, 2022Updated 4 years ago
- Python bindings to libhtp☆31Oct 13, 2020Updated 5 years ago
- Collects WHOIS details for every IPv4 netblock. Reports supported via Elasticsearch.☆103Oct 30, 2018Updated 7 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Sample staging & detonation utility to be used in combination with Cuckoo Sandbox.☆85Dec 5, 2023Updated 2 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Modified edition of cuckoo☆272Sep 9, 2019Updated 6 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- PassiveDNS in Go☆125Feb 16, 2026Updated last week
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Mal Tindex is an Open Source tool for indexing binaries and help attributing malware campaigns☆67Jun 26, 2017Updated 8 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- NTP logger/honeypot☆55Mar 27, 2014Updated 11 years ago
- Home to the ActorTrackr source code☆24Jun 21, 2017Updated 8 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Passive Vulnerability Auditor☆136Jul 26, 2016Updated 9 years ago