PAST2212 / domainthreat
Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping
β43Updated this week
Related projects: β
- HookPhish is a Python script designed to aid in the detection of phishing websitesβ31Updated 10 months ago
- π΄ββ οΈπ° Another Ransomware gang trackerβ135Updated this week
- Purpleteam scripts simulation & Detection - trigger events for SOC detectionsβ149Updated 3 weeks ago
- MISP Playbooksβ167Updated last month
- The Threat Actor Profile Guide for CTI Analystsβ89Updated last year
- Track C2 servers, tools, and botnets over time by framework and locationβ35Updated 10 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defenseβ68Updated 9 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β108Updated 5 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.β59Updated 2 months ago
- β23Updated this week
- Building a consolidated RSS feed for articles about cyberattacksβ54Updated this week
- β79Updated last month
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can geneβ¦β221Updated 11 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you comβ¦β159Updated 5 months ago
- ThreatSeeker: Threat Hunting via Windows Event Logsβ93Updated last year
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indiβ¦β91Updated 2 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β57Updated 8 months ago
- A collection of companies that disclose adversary TTPs after they have been breachedβ236Updated 4 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β147Updated 4 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.orgβ100Updated last year
- An open-source self-hosted purple team management web application.β232Updated last month
- β125Updated 11 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proacβ¦β84Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor manβs SOC.β48Updated 2 weeks ago
- β55Updated 4 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!β55Updated 10 months ago
- A collection of various SIEM rules relating to malware family groups.β60Updated 3 months ago
- Cyber Underground General Intelligence Requirementsβ85Updated 7 months ago
- God Mode Detection Rulesβ130Updated last month
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so onβ81Updated 4 months ago