NoThrowForwardIt / PhishLabBRLinks
If you are interested in a live feed API, please contact us
☆16Updated 3 months ago
Alternatives and similar repositories for PhishLabBR
Users that are interested in PhishLabBR are comparing it to the libraries listed below
Sorting:
- IOCs collected during day-to-day activities☆68Updated this week
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆51Updated 4 months ago
- Sniffing out well-known threat groups☆50Updated 11 months ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆33Updated 11 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- A series of python scripts to extract information from Dark Web Applications☆12Updated 3 months ago
- Capture screenshots of onion services on an onion service.☆49Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆54Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- ☆44Updated 4 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- ☆66Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆30Updated last year
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆67Updated last month
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆55Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆37Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆44Updated 4 months ago
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆14Updated last year
- CarbonBlack EDR detection rules and response actions☆71Updated 10 months ago
- Detection rule validation☆41Updated last year
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Updated last year
- ☆51Updated 3 weeks ago
- Tor onion address lookup☆39Updated 5 months ago