NCSC-NL / flubotLinks
Flubot DGA domains
☆19Updated 3 years ago
Alternatives and similar repositories for flubot
Users that are interested in flubot are comparing it to the libraries listed below
Sorting:
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 4 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Tool used to perform threat intelligence against packet data☆36Updated 9 months ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆56Updated 2 years ago
- A bunch of scripts I use to work with urlscan.io☆35Updated 6 years ago
- Quick lookup files for SUNBURST Backdoor☆12Updated 4 years ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 6 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- ☆39Updated 4 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- Elasticsearch/Kibana environment and log data for Sigma workshop☆27Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- Network Forensic Extendable Analysis Tool☆39Updated 3 years ago
- Remote / Onsite Security Assessment Jumpkit☆39Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆34Updated last year
- ☆30Updated 7 years ago
- Useful commands for infosec☆29Updated 2 years ago
- pocket guide for core threat hunting concepts☆23Updated 5 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 2 weeks ago
- ☆13Updated 6 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated last month
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15Updated 6 years ago