Te-k / pysafebrowsing
Python 3 Google Safe Browsing library
☆25Updated 8 months ago
Alternatives and similar repositories for pysafebrowsing:
Users that are interested in pysafebrowsing are comparing it to the libraries listed below
- ☆24Updated 2 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 4 years ago
- ☆15Updated 2 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated 2 weeks ago
- CyCAT.org API back-end server including crawlers☆30Updated 2 years ago
- Python module to use the MISP Taxonomies☆29Updated last month
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆57Updated last year
- Universal Honey Pot☆31Updated 2 years ago
- ☆53Updated 4 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆30Updated 2 years ago
- ☆27Updated 6 years ago
- Yet another way to find where to report an abuse☆31Updated 3 weeks ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Website crawler with YARA detection☆88Updated last year
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Updated 6 months ago
- Easy way to create a MISP event related to a Phishing page☆17Updated last year
- Modular command-line threat hunting tool & framework.☆17Updated 4 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆9Updated 2 years ago
- Spam trap management☆23Updated 8 months ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- CyCAT.org taxonomies☆14Updated 3 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆69Updated last year
- Tool for automatic list generation of known TOR and VPN exit nodes☆30Updated last year
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 5 months ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆54Updated last year