NCSC-NL / flubotLinks
Flubot DGA domains
☆19Updated 3 years ago
Alternatives and similar repositories for flubot
Users that are interested in flubot are comparing it to the libraries listed below
Sorting:
- Quick lookup files for SUNBURST Backdoor☆12Updated 4 years ago
- BGP ranking is a free software to calculate the security ranking of Internet Service Provider (ASN)☆74Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- Visual Studio Code extension for MITRE ATT&CK☆54Updated last year
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- ☆12Updated 3 years ago
- Zeek package to generate a SMB client fingerprint☆27Updated 5 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆33Updated 2 weeks ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated 11 months ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated 2 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆69Updated 5 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆23Updated 8 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Updated last year
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆32Updated 2 years ago