CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report of phishing sites based off your keywords and Top level Domains.
☆10Oct 12, 2020Updated 5 years ago
Alternatives and similar repositories for CertWatcher
Users that are interested in CertWatcher are comparing it to the libraries listed below
Sorting:
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- Alert when a issuer, or domain changes for a signed certificate☆13Dec 8, 2022Updated 3 years ago
- An open source virus scan aggregation framework.☆25Apr 25, 2014Updated 11 years ago
- EXIF-based command and control PoC☆15Mar 20, 2020Updated 5 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Mar 3, 2019Updated 7 years ago
- Hunting cryptonote-related miners☆23Nov 3, 2020Updated 5 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- ☆24Sep 28, 2022Updated 3 years ago
- A triage data collection script for macOS☆29Nov 27, 2020Updated 5 years ago
- Framework to automatically test and explore the capabilities of generic AV engines☆70Jan 15, 2019Updated 7 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- Use this library to automatically extract PE files compressed with aplib from a binary blob.☆34May 21, 2019Updated 6 years ago
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- ✨ Brand Indicators for Message Identification or BIMI ( 📢 pronounced: Bih-mee) is an emerging email 📧 specification that enables the us…☆10Mar 6, 2024Updated 2 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- GPG key integration for Blockstack client applications☆10Aug 1, 2017Updated 8 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- ☆25Dec 15, 2025Updated 2 months ago
- Native desktop client for slack.com☆10May 23, 2018Updated 7 years ago
- Logs the I.P address(IPv4) of the device present on LAN and performs OS guessing .☆10Apr 24, 2022Updated 3 years ago
- Unlock your Netgear EX2700☆10Oct 31, 2016Updated 9 years ago
- Python based CLI for MalwareBazaar☆39Jul 22, 2025Updated 7 months ago
- Write Perl subroutines in other programming languages☆19Jul 10, 2025Updated 7 months ago
- X utilities in POSIX shell scripts.☆13Dec 20, 2021Updated 4 years ago
- Python Web App to Parse and Track Email and http Pcap Files.☆54Jul 14, 2013Updated 12 years ago
- OAuth Security Cheatsheet☆41May 12, 2014Updated 11 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Get up and running with Llama 3.1, Mistral, Gemma 2, and other large language models.☆15Apr 24, 2025Updated 10 months ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- ☆11May 24, 2022Updated 3 years ago
- Application which generates the structure and related files necessary for developing a Data Exchange Layer (DXL) integration with Python☆12Mar 17, 2020Updated 5 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- moddwatch watches files and directories for modifications☆18May 23, 2025Updated 9 months ago
- CLI tool for testing Office documents with macros using MaliciousMacroBot☆12Dec 3, 2023Updated 2 years ago