SquatPhish / 1-Squatting-Domain-Identification
☆15Updated this week
Related projects: ⓘ
- ☆50Updated 6 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 5 years ago
- ☆18Updated 6 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆17Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated last year
- Performs OCR on image files and scans them for matches to YARA rules☆39Updated 5 years ago
- Providing timelines based on OSINT Reports☆32Updated last year
- ☆24Updated last year
- Python scripts to parse scans.io ssl data and ingest into elasticsearch for searching☆33Updated 8 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆18Updated 7 years ago
- A script to track malware IOCs with OSINT on Twitter.☆52Updated 4 months ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Updated 5 years ago
- SANS Hunting on the Cheap☆35Updated 8 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆11Updated 3 years ago
- ☆14Updated 6 years ago
- Cyber Intel Management☆46Updated 6 years ago
- ☆15Updated this week
- ☆39Updated this week
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆65Updated 5 years ago
- ☆40Updated this week
- Network Forensics Workshop Files☆17Updated 9 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆29Updated this week
- Honeypot log processor to create OTX Pulse entries☆29Updated 8 months ago
- ☆27Updated 6 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- ☆21Updated 6 years ago
- Open Development projects for TekDefense☆77Updated 7 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago