Te-k / pysafebrowsing
Python 3 Google Safe Browsing library
☆25Updated 9 months ago
Alternatives and similar repositories for pysafebrowsing:
Users that are interested in pysafebrowsing are comparing it to the libraries listed below
- ☆24Updated 2 years ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 4 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆32Updated last month
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 2 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Universal Honey Pot☆31Updated 2 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆9Updated 2 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Spam trap management☆23Updated 9 months ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆37Updated 8 months ago
- ☆53Updated 4 years ago
- ☆15Updated 2 years ago
- Website crawler with YARA detection☆88Updated last year
- ☆27Updated 6 years ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Yet another way to find where to report an abuse☆32Updated 2 months ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Python bindings for Yeti's API☆18Updated last year
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆60Updated last year
- Virustotal Data to Timesketch☆17Updated 6 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 2 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆13Updated 2 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Updated 3 years ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 6 months ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- External twitter feeder for AIL framework☆16Updated last year
- Triage automation for suspect URLs☆12Updated 5 years ago