SteveD3 / kit_hunter
A basic phishing kit scanner for dedicated and semi-dedicated hosting
☆107Updated last year
Related projects ⓘ
Alternatives and complementary repositories for kit_hunter
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆99Updated 2 years ago
- For storing of the volumes☆3Updated 4 years ago
- A tool designed to hunt for Phishing Kit source code☆215Updated last year
- Website crawler with YARA detection☆88Updated last year
- Because phishtank was taken.. explore phishing kits in a contained environment!☆43Updated 2 years ago
- Import specific data sources into the Sigma generic and open signature format.☆77Updated 2 years ago
- Resources for SANS CTI Summit 2021 presentation☆102Updated last year
- Automagically extract forensic timeline from volatile memory dump☆123Updated 6 months ago
- Repository for SPEED SIEM Use Case Framework☆52Updated 4 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Updated 2 years ago
- Python library for threat intelligence☆79Updated 4 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆65Updated 7 months ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆107Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆138Updated 3 years ago
- ☆84Updated 8 months ago
- Valhalla API Client☆63Updated last year
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆66Updated last year
- ☆46Updated this week
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆122Updated 6 months ago
- A CALDERA plugin☆72Updated last week
- Linux Incident Response☆89Updated 5 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆84Updated last year
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆44Updated 2 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 3 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆134Updated 11 months ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆55Updated last month
- ☆78Updated 4 years ago
- Collecting & Hunting for IOCs with gusto and style☆238Updated 3 years ago