NoThrowForwardIt / PhishLabBRLinks
If you are interested in a live feed API, please contact us
☆16Updated 5 months ago
Alternatives and similar repositories for PhishLabBR
Users that are interested in PhishLabBR are comparing it to the libraries listed below
Sorting:
- Sniffing out well-known threat groups☆61Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Detection rule validation☆41Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆53Updated this week
- These FLARE-VM configuration files are designed to be help setup a purpose-built installation, remove unnecessary packages to help stream…☆15Updated last year
- Capture screenshots of onion services on an onion service.☆71Updated last year
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆20Updated 4 months ago
- ☆66Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆52Updated 6 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆17Updated 3 years ago
- IOCs collected during day-to-day activities☆77Updated this week
- information about ransomware groups (Ransomware Analysis Notes)☆39Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- ☆25Updated 2 years ago
- Tor onion address lookup☆54Updated last month
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 3 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Collection of videos of Raids on Cybercriminals☆20Updated 6 months ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- ☆53Updated last month
- Ransomware groups posts☆42Updated this week
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆32Updated 7 months ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆14Updated last year
- A series of python scripts to extract information from Dark Web Applications☆13Updated 5 months ago
- ☆17Updated 3 years ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆12Updated 2 years ago