Te-k / pysafebrowsingLinks
Python 3 Google Safe Browsing library
☆28Updated 8 months ago
Alternatives and similar repositories for pysafebrowsing
Users that are interested in pysafebrowsing are comparing it to the libraries listed below
Sorting:
- ☆25Updated 3 years ago
- Useful commands for infosec☆29Updated 2 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆34Updated this week
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 4 years ago
- ☆15Updated 3 years ago
- Tool for automatic list generation of known TOR and VPN exit nodes☆29Updated last year
- Yet another way to find where to report an abuse☆30Updated 10 months ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆67Updated 2 years ago
- The missing API for the CISA Known Exploited Vulnerabilities Catalog. This repository contains the source running at kevin.gtfkd.com☆18Updated last week
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 3 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- Converting data from services like Censys and Shodan to a common data model☆51Updated 5 months ago
- ☆55Updated 5 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆80Updated last year
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- ☆28Updated 5 months ago
- Website crawler with YARA detection☆90Updated 2 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- Domain name permutation as a service☆66Updated 9 months ago
- ☆14Updated 7 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Updated last year
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆82Updated 8 months ago
- Modular command-line threat hunting tool & framework.☆17Updated 5 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Updated 3 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆42Updated 2 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Updated 3 years ago
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆57Updated 2 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- Ayashige provides a list of suspicious newly updated domains as a JSON feed☆39Updated last year